text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
Q: How to use Future interface? i am wondering how future interfaces work in java for achieving asynchronous execution. Future<Map> xyz = [:] A: You need to use the Executors framework Create an ExecutorService, many types exist ExecutorService executor = Executors.newFixedThreadPool(1); Submit a task Future<Integer> future = executor.submit(new Callable<Integer>() { @Override public Integer call() throws Exception { for (int i = 0; i < 1e9; i++) { } return 123; } }); Sometime later, use the future reference to get the result. Some possible uses future.isDone(); // check if ready future.get(); // blocks until ready or InterruptedException future.get(10, TimeUnit.SECONDS); // or wait a given time or TimeoutException future.cancel(); // interrupt task
High
[ 0.680216802168021, 31.375, 14.75 ]
Q: Enable/disable Time Machine depending on network connection type I've not got a great Wi-Fi setup here at home and it sometimes results in failed Time Machine backups. Is there a way of specifying that Time Machine only backs up under certain circumstances - i.e. Ethernet connection is active...? A: This AppleScript will check if the Ethernet connection is active, and then run a Time Machine backup if so. First, disable Time Machine in System Preferences. The below method will run it automatically. While connected to Ethernet, you will need to run one command manually to confirm which interface Ethernet is assigned to. Run this command: ifconfig It should output a screen full of information. What you are looking for is a section labeled en with a number after it, and whose last line is status: active, like this: en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=b<RXCSUM,TXCSUM,VLAN_HWTAGGING> ether 00:25:00:ef:30:3c inet6 fe80::225:ff:feef:303c%en1 prefixlen 64 scopeid 0x5 inet 192.168.1.68 netmask 0xffffff00 broadcast 192.168.1.255 media: autoselect (100baseTX <full-duplex>) status: active Note the number next to en at the beginning - this is the interface that your Ethernet connection is running on. In the script below, where it says en9, replace 9 with the number from above. (If you have a Mac Pro, it will most likely be en0 or en1. Otherwise, it will likely be en0.) if (do shell script "ifconfig en9 | awk '/inet/ {print $2}'") is not equal to "" then do shell script "/System/Library/CoreServices/backupd.bundle/Contents/Resources/backupd-helper &" end if Save this as EthernetTimeMachine.scpt into your home folder (/Users/<yourusername>/). Next open up Terminal and type the following command: pico ~/crontab This will open up a text editor to allow you to schedule this script to run on an hourly basis, just like Time Machine does by default. Paste this line: @hourly osascript ~/<yourusername>/EthernetTimeMachine.scpt Press control+X then type y and press return to save and exit. To disable it, go back into Terminal, again use the command: pico ~/crontab Then delete the line you added above and use the same steps to save and exit. A: This is an alternative to the other script I posted. This one runs in the background and tests the network connection every two minutes to determine if it is using an Ethernet connection or wireless. If on Ethernet, it enables Time Machine; when the connection switches to wireless it disables Time Machine. Step 1: System Check While connected to Ethernet, you will need to run one command manually to confirm which interface Ethernet is assigned to. Run this command: ifconfig It should output a screen full of information. What you are looking for is a section labeled en with a number after it, and whose last line is status: active, like this: en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=b<RXCSUM,TXCSUM,VLAN_HWTAGGING> ether 00:25:00:ef:30:3c inet6 fe80::225:ff:feef:303c%en1 prefixlen 64 scopeid 0x5 inet 192.168.1.68 netmask 0xffffff00 broadcast 192.168.1.255 media: autoselect (100baseTX <full-duplex>) status: active Note the number next to en at the beginning - this is the interface that your Ethernet connection is running on. Step 2: Create the AppleScript Application In the script below, where it says set wired_interface to "0", change the 0 to the number next to en in the above output. (It should be 0; if you are on a Mac Pro, it may be 1.) Also in the below script, at the top where it says myusername, substitute your own Mac username. -- Edit variables here -- global current_username set current_username to "myusername" global wired_interface set wired_interface to "0" -- DO NOT EDIT BELOW THIS LINE -- global last_connection set last_connection to "wireless" on idle if (do shell script "ifconfig en" & wired_interface & " | awk '/inet/ {print $2}'") is not equal to "" then -- on ethernet if last_connection is equal to "wireless" then -- turn TM on -- else do nothing, we're still on ethernet set last_connection to "ethernet" do shell script "sudo /Users/" & current_username & "/TMSwitch/TM_On.csh" end if else -- on wireless if last_connection is equal to "ethernet" then -- turn tm off -- else do nothing, we're still on wireless set last_connection to "wireless" do shell script "sudo /Users/" & current_username & "/TMSwitch/TM_Off.csh" end if end if return 120 end idle ⌘+s to save. In the Save property sheet, set the File Format as Application, and check the box for Stay open after run handler. Save it wherever you like - Desktop, or Applications Folder - it really doesn't matter, just know where you saved it. Step 3: Create the Shell Scripts Next, open Terminal. Type the following commands: cd ~/ mkdir TMSwitch cd TMSwitch pico TM_On.csh Paste the following line in: defaults write /Library/Preferences/com.apple.TimeMachine AutoBackup -bool TRUE Press control+x, type y and press return to save and exit. Then run this command: pico TM_Off.csh And in this file paste the following line: defaults write /Library/Preferences/com.apple.TimeMachine AutoBackup -bool FALSE Again, control+x, then y and return to save and exit. Next, enter these commands: chmod 4555 TM_O*.csh chown root TM_O*.csh Step 4: Setting Up sudo to Run Without a Password Letting the Terminal command sudo run without a password can be very dangerous. That's why the steps above created the shell scripts in their own directory, so what can actually be run is limited. Enter the following command in Terminal: sudo pico /etc/sudoers Then enter your administrator password when prompted. This may bring you to a (mostly) blank screen, or it may have some text in it. If it's blank - that's fine. You'll just paste the below line at the top. If text already exists, that's also fine; use your down arrow to go right below the lines already in the # User privilege specification section, as seen in the below screenshot. Here, add the following line: <yourusername> ALL = NOPASSWD: /Users/<yourusername>/TMSwitch/* In both places where <yourusername> appears, replace it with your Mac username. Press control + x, type y and press return to save and exit. Test that these files turn Time Machine on and off by running the following command (assuming Time Machine is currently on): sudo ./TM_Off.csh After a moment the Time Machine icon in the menubar should turn gray, indicating Time Machine is turned off. (You may need to click the icon for it to reflect the change). Assuming this works, run this command: sudo ./TM_On.csh And Time Machine should be re-enabled. And Off You Go Run the application you created in AppleScript Editor above, and it will remain open, enabling and disabling Time Machine as your connection switches from Ethernet to wireless and back. To disable switching, simply close the AppleScript application (right-click on the icon in the Dock and choose Quit).
Mid
[ 0.591145833333333, 28.375, 19.625 ]
Category Archives: "Reforestation" Yabal was so happy to have the opportunity this year to coordinate the reforestation of over 4,000 trees with the Czech Republic organization Love for Guatemala and their volunteers in the rural community of Chuicutama. It was a wonderful day of tree love as we helped plant trees in their communal mountain forest nearby the village.
Mid
[ 0.6396396396396391, 35.5, 20 ]
Most visual stimuli we experience on a day-to-day basis are continuous sequences, with spatial structure highly correlated in time. During rapid serial visual presentation (RSVP), this correlation is absent. Here we study how subjects’ target detection responses, both behavioral and electrophysiological, differ between continuous serial visual sequences (CSVP), flashed serial visual presentation (FSVP) and RSVP. Behavioral results show longer reaction times for CSVP compared to the FSVP and RSVP conditions, as well as a difference in miss rate between RSVP and the other two conditions. Using mutual information, we measure electrophysiological differences in the electroencephalography (EEG) for these three conditions. We find two peaks in the mutual information between EEG and stimulus class (target vs. distractor), with the second peak occurring 30–40 ms earlier for the FSVP and RSVP conditions. In addition, we find differences in the persistence of the peak mutual information between FSVP and RSVP conditions. We further investigate these differences using a mutual information based functional connectivity analysis and find significant fronto-parietal functional coupling for RSVP and FSVP but no significant coupling for the CSVP condition. We discuss these findings within the context of attentional engagement, evidence accumulation and short-term visual memory.
High
[ 0.6632124352331601, 32, 16.25 ]
Effectiveness of fibrin coating in the management of web formation after laryngomicrosurgery. To explore the effectiveness of fibrin coating in reducing web formation after endoscopic management of the anterior commissure of the larynx. Using a spray device that is generally used for laparoscopic operations, we covered the wound with fibrin glue (Bolheal®) to avoid web formation. This technique was employed in cases wherein the anterior commissure was mainly managed by laser operation; the glue was sprayed after vaporization. Fibrinogen was first sprayed and the wound was properly soaked with a swab, which was followed by application of thrombin. We used this method in 17 cases and evaluated voice function by acoustic analysis - pitch perturbation quotient (PPQ) and amplitude perturbation quotient (APQ) - and maximum phonation time (MPT) before and after the operation. No severe web formation was observed at three months after the operation. PPQ values improved from 3.048±2.801% to 0.653±0.463% (p<0.05, paired t-test). APQ values improved from 7.996±5.003% to 3.042±1.872% (p<0.05, paired t-test). Voice quality did not worsen in any of the cases. MPT values improved from 17.2±10.8s to 26.7±14.2s (p<0.05, paired t-test) Voice function improved 3months after the operation in all cases. The fibrin coating method is an easy and effective approach to avoid web formation without creating cervical wounds in cases that require handling of the anterior commissure under laryngomicrosurgery.
High
[ 0.6682926829268291, 34.25, 17 ]
Recipe: Eggnog Breakfast Crumble Crunch Cake I’m hosting a big group of family members for the holidays, and I’m already starting to plan menus for while they are here. Super tasty, special breakfasts are one of my favorite things to make, so this eggnog breakfast crumble crunch cake from Jessica of How Sweet it Is is going on the list. Cake for breakfast? You know it!
Low
[ 0.47619047619047605, 30, 33 ]
“Ten members of the security forces were killed in the fighting in the border town of Ben Guerdane, which Tunisian President Beji Caid Essebsi condemned as an ‘unprecedented’ jihadist attack aimed at ‘establishing a new Islamic State emirate.'” The Islamic State has global ambitions. No, it will not take over the world, as it wishes to do. It will, however, kill a great many people while trying. “More than 50 people killed, including eight civilians, as ISIS fighters carry out Tunisia massacre in bid to ‘establish a new emirate,'” by Tom Wyke, MailOnline, March 7, 2016: Tunisian forces fought off fierce attacks from ISIS jihadists near the Libyan border, in clashes that left at least 50 people dead, including seven civilians. Ten members of the security forces were killed in the fighting in the border town of Ben Guerdane, which Tunisian President Beji Caid Essebsi condemned as an ‘unprecedented’ jihadist attack aimed at ‘establishing a new Islamic State emirate’. The border, which has long been a key access point for jihadists entering Libya to join ISIS, has now been closed and a night curfew will be enforced. In statements broadcast on state television, Essebsi said the assault was ‘maybe aimed at controlling’ the border region with Libya, and vowed to ‘exterminate these rats’. It was the second deadly clash in the border area in less than a week as Tunisia battles to stop the large number of its nationals who have joined ISIS’s Libyan franchise, based in the city of Sirte. The jihadists have taken advantage of a power vacuum since the NATO-backed overthrow of longtime dictator Muammar Gaddafi in 2011 to set up bases in several areas of Libya, including the Sabratha area between Tripoli and the Tunisian border. US-led airstrikes targeted an important ISIS training camp in Sabratha, where many Tunisian nationals were thought to have been learning basic weapons handling and bombmaking. Fears remain that the jihadi group is looking to inflict another attack on westerners in Tunisia, following the Bardo museum and Sousse massacre last year. The government said that an army barracks, police and National Guard posts in Ben Guerdane came under attack in coordinated pre-dawn assaults. Six members of the National Guard, two policemen, a customs official and a soldier died in the fighting, the defence and interior ministries said in a joint statement. Six wounded militants were captured, the defence ministry said. The government said that an army barracks and police and National Guard posts in Ben Guerdane came under attack in coordinated pre-dawn assaults Hospital official Abdelkrim Chafroud said a 12-year-old boy was among the dead civilians….
Mid
[ 0.6388888888888881, 31.625, 17.875 ]
g. 1 Let s be (2/6 + 3)*30/20. Suppose 5*g - 78 = -4*c, s*g = 5*c - 8*c + 81. Solve 4*t - g = 2*i, -2*i - 25 = -5*t - 4 for t. 3 Let l(d) = 2*d. Let y be l(2). Suppose 20*c - 86 = 194. Let i(q) = q**2 - 10*q + 10. Let m be i(9). Solve 3*w + y*v + 4 = -m, -5*w - v = c for w. -3 Suppose -30 = -19*p + 8. Suppose -x + 2*c + 9 = 0, 5*x - 5*c = -p*c + 31. Solve 0 = -x*t - 2*a + 15, 3*t + 5 = -a + 15 for t. 5 Let u(t) = -t**3 - 6*t**2 + 5*t - 2. Let j be u(-7). Let l be (-15)/(-3) + -1 + 12 + -14 + 3. Solve -18 = -3*r - l*i + 8, 3*i = j for r. 2 Let z be 3/(-18) + 939/18. Suppose -a + p + 29 = 0, 2*a - 3*p = z + 10. Let v = 3846 + -3840. Solve -l - v + 2 = 0, a = -3*o - 4*l for o. -3 Let d = -34 - -19. Let q = 443 - 456. Let o = q - d. Solve 4 = 3*u - 4*u, -o*u = 5*g + 23 for g. -3 Suppose -b = -3*m - 26 + 28, -4*b - 3*m = -37. Suppose 1 = 2*k + k - l, -l = k - b. Solve 3 = -4*n - 4*x - 33, -3*n + 2*x = k for n. -4 Let j = -6605 - -6608. Solve 0 = 3*r + 5*n - 0 + 3, 0 = 4*r - j*n + 4 for r. -1 Let x be 2/(-12) - ((-295)/(-30) - 9). Let z be x/(-4) + (-2 - 60/(-16)). Solve -7 = 3*o - 0*g + z*g, -3*o = 4*g + 5 for o. -3 Suppose -5*j = -3*s - 43, -3*s = 3*j + 75 - 72. Solve -4*m = j*q + 4, -2*m - 4 = -2*q - 2 for m. -1 Suppose -5*m = 2*u + 27, 30 = 4*u - 4*m + 2*m. Solve 2*a - 5*r = -3*r - u, 0 = -5*a - 5*r - 40 for a. -5 Let a be (1 + 6)*360/252. Suppose a = 6*u - 20. Solve -3*r - 5*y = 13, -u*y - 8 = -4*r + 2*r for r. -1 Let n = -65 - -83. Let h(a) = -19 - n*a + 2*a**2 + 12*a + 26*a. Let y be h(-11). Solve p = -y*p - 4*k - 4, p = 3*k - 13 for p. -4 Let y be 33/77 + 148/14. Suppose 12*u - 18*u = 48. Let a = u + y. Solve n + 3 = 5*o, -3*o - a*n + 3 = -6*o for o. 1 Suppose 19*c - 38 + 26 = 45. Solve 6 = -u - 4*r - r, 3*r = -c for u. -1 Let l = 27071 + -27057. Solve 2*f + 3*c = l, 3*f = 5*c - 8 - 9 for f. 1 Let b(k) = -k**3 + 11*k**2 - 24*k + 146. Let l be b(10). Solve 4*h - 3*c - 35 = 0, 0 = -7*h + l*h - 5*c - 20 for h. 5 Let p be ((-74)/296)/((1/8)/(-1)). Let m(z) = -51*z + 106. Let k be m(p). Solve -5*r - 3*y - 1 = 0, -k*y = -3*r - 3 + 14 for r. 1 Suppose -2*s - 8 = -16. Suppose -s*r - 2*n - 3*n + 65 = 0, 5*r = -2*n + 77. Suppose 17*o - r = 12*o. Solve -3*x = -0*x - 4*a + 14, -x + o*a - 13 = 0 for x. 2 Let i(f) = -45*f + 4. Let p = 266 + -266. Let c be i(p). Solve -3*b = 2*m - 20, 8 = 3*b - c for m. 4 Suppose 0 = -2*c - 5*u + 99, 4*c - 3*u - 232 = -c. Let a(v) = -4*v + c - 30 + 3*v. Let t be a(15). Solve j + 2*m + 2*m = 14, -t*m = -4*j - 16 for j. -2 Let w(h) = h**2 - 8*h - 8. Let c be w(-3). Suppose -a - 4*a - c = 0, 5 = 5*o + 3*a. Solve 0 = i + o*m + 12, -36 = 2*i - 7*i + 4*m for i. 4 Let q = -99 - -127. Suppose q*x = -21 + 189. Solve 4*t + z + 9 = 0, z + x = 3*z for t. -3 Let z = 10684 + -10665. Solve -4*g = -5*x + 6*x - z, 0 = -4*g + 16 for x. 3 Let k be 2 - 1 - (-71 - 0). Suppose -4*i - 2*l = -i - 20, -3*l = -3*i. Solve 3*j = -w - 7, 0 = i*j - 5*w - 31 + k for j. -4 Suppose 5 - 5 = 83*u - 0. Solve 3*c + u + 10 = w, 14 = 3*w - c for w. 4 Let a = -6267 - -6267. Solve 3*w + 3*x = a, 0 = w + 2*x - 7 + 3 for w. -4 Let l(u) = 33*u - 460. Let j be l(14). Solve -h + 94 = 90, 3*v = h + j for v. 2 Let v = 1079 + -1054. Solve -18 - 1 = -5*l - 3*r, 3*l - 5*r - v = 0 for l. 5 Suppose x + x = 12. Let a(d) = 45*d - 4 - 115*d + 41*d + 36*d - d**2. Let m be a(x). Solve -5*n - m*t = -22, 4 - 6 = -2*t for n. 4 Suppose 0 = -14*y + 15*y - 88. Let t = y + -79. Suppose 9 = 2*z - t. Solve 2*o + z + 11 = -4*q, 0 = 4*q + 4*o + 24 for q. -4 Let v(s) = -s**2 - 56*s - 781. Let k be v(-29). Solve c = -2*o - 5, -2*c + 6*c = k*o for c. -1 Let q be -6 - (7 + -8 + -33). Suppose q + 53 = 27*d. Solve -3*o + 15 = 0, 3*g - d*o + 0 + 27 = 0 for g. -4 Let h be 18 - (42 + -7 + -21). Solve 0 = -u - p + 14 - 13, 12 = h*u + 2*p for u. 5 Let h(m) = -m**2 - 5*m - 1. Let k be h(-4). Let q = 404 - 364. Let a(l) = l**2 - 44*l + 160. Let s be a(q). Solve 24 = 5*u - j, s = -u + k*j + 2 for u. 5 Let c be 14 + ((-18)/24 - 13/4). Let o(l) = l**2 - 12*l + 22. Let v be o(c). Solve 2*f = -0*f - v*h - 16, 2*h - 4 = 3*f for f. -4 Let m(s) = -s**3 - 4*s**2 + 2*s - 3. Let f be m(-5). Let a be ((-25)/(-5) - -4) + -4. Let o be 20/a*-1 - -7. Solve 10 = -2*r + 4*r + o*p, r + 5*p = f for r. 2 Suppose -2122*q + 2146*q - 1008 = 0. Solve o + 4*t + 10 = 0, 0 = -q*o + 44*o + t + 6 for o. -2 Let t be (-1 + (-42)/(-12))*(22 - 0). Let p = -41 + t. Let d(s) = -s + 14. Let j be d(p). Solve -5*q + j*q = -3*o + 3, -5*o = -q - 5 for o. 1 Let j be 6/27 + 100/36. Suppose 5*x - j*x + d = 3, 26 = 4*x - 2*d. Suppose 16*b - 43 = 117. Solve -3*w + 2*c + b = -w, -2*w - x = 5*c for w. 3 Suppose 14041 = -0*r - 20*r + 15181. Solve 2*d + 59 - r = 5*b, -3*d = -5*b - 2 for d. 4 Let n = 35 - 29. Let j be (n + -5)/(4*(-2)/(-32)). Solve j - 5 = 2*y + 5*d, 4 = 4*d for y. -3 Let r = -18258 - -18135. Suppose 670 = -v + 6*v. Let p = r + v. Solve -2*h + 4*l = -l + p, 4*h = -l + 11 for h. 2 Suppose -4*v + 346 = -2722. Let y = v + -746. Solve 5*b = 2*g + y, -3*g + 4*b = 9 + 12 for g. -3 Let v = 1720 - 1715. Solve -2*n + 26 = 3*z + 38, -v*n - 25 = 5*z for n. -3 Suppose l - 22005 = -26*l. Let i = 817 - l. Solve -20 = i*s + 2*v, 6*v = 5*s + 5*v + 20 for s. -5 Let t be 2/(-4 + (-50)/(-15)). Let q be (-1)/(1*t/6) + 5. Let d be 41/4 - q/28. Solve -3*i = 2*i + n + d, -16 = 2*i - 2*n for i. -3 Let z(u) = -10*u + 6. Let g be z(-2). Let r(k) = -8*k**2 - k**3 + 19*k**2 - 9*k + k - g + 9. Let o be r(10). Solve 4*a + 13 = s, -7*a = -3*a + s + o for a. -2 Let z be ((-7)/2)/((4 + 1)/(-10)) + -13. Suppose 5 = 2*p - 35. Let d be z/9*-1 - p/(-15). Solve d*h = -5*o + 6, -o + 3*h + 2 = -6 for o. 2 Let r = 2 + 3. Let a = 32 + 9. Suppose 4*i + 25 = a. Solve -r*s + 45 = 5*w, 0 = 2*w + s + i*s - 30 for w. 5 Suppose 5*b + 3*b = 5*b. Suppose 0 = j, -17*v + 12*v + 4*j + 55 = b. Solve 2*a - 3*p - 12 = 0, 5*a - 2*p = -4*p + v for a. 3 Let u be (0 - 3) + -3 + 10. Suppose 0 = r + 4*r - 10. Suppose -4*s + r*d + 11 = 3, -4*s + 2 = -5*d. Solve 1 = f, -s*k - 4 = -u*f - 6 for k. 2 Let w be (-35)/(-42)*(-108)/(-18). Solve -25 = -w*n + 4*a, -25 = -2*n - 3*n - 4*a for n. 5 Suppose s - 182 = -13*s. Let h(i) = -10*i - 4*i + s*i - 7. Let a be h(-9). Solve 3*q + 4*c + 1 + 20 = 0, 9 = a*q - 5*c for q. -3 Let z(k) = 2*k - 3. Let d be 3/((-3)/(-2) + -3). Let x be z(d). Let u(c) = c + 10. Let s be u(x). Solve -s*a - m + 12 = -0*m, 0 = -3*a + 2*m + 12 for a. 4 Let t(d) be the first derivative of -d**3/3 - 2*d**2 + 3*d - 24. Let v be t(-4). Let a = -6 + 14. Solve 5*m + 33 = -2*n, a = v*n + 2*m - 6*m for n. -4 Let x = 2238 - 2233. Solve -x*o - 87*d - 28 = -88*d, 3*o + 21 = 2*d for o. -5 Let s(v) = 6*v + 15. Let d be s(-2). Let u be 0/(1 + (-5)/(-5)). Suppose 5*h - h + 12 = 3*g, -12 = 4*g + 4*h. Solve z + 0*z - d*b + 4 = u, g = -3*b for z. -4 Let r = 63 - 43. Let x = r - 10. Suppose 2*s + 5*i = 20, 2*i + 2 - x = -5*s. Solve s = 3*g + 3*q + 18, -2*g + 5*q - 4*q - 6 = 0 for g. -4 Let z be (-9 - (-855)/60)/(12/16). Solve 2*c = 3*r + 8, -z + 13 = -3*r + 3*c for r. -4 Suppose 210*c + 2*d = 212*c - 106, -4*d + 12 = 0. Solve -c*m + 59*m - 15 = 0, -2*f = -m - 1 for f. 3 Suppose 5*k - 21 = 3*q, 10*k - 11 = 7*k + q. Solve -k*u + 9*v = 8*v - 7, u = v + 5 for u. 1 Let l(f) = -f**3 + 17*f. Let r be l(7). Let d be 2/8 + (-840)/r. Solve -25 = w + d*w, 2*i - 2*w = 10 for i. 0 Suppose -3*b = -4*b. Suppose -3*c + b*c - 4*m = 3, 3*c + 3*m = 0. Suppose -363*r + 18 = -354*r. Solve 0*l - r*h + 3 = c*l, 2*h - 1 = -l for l. 1 Let t(c) = -51*c + 637. Let u be t(12). Solve 3 = -2*o + 6*o - q, -5*o = 3*q - u for o. 2 Let w(b) = b**3 - 4*b**2 - 3*b - 12. Let a = -85 + 90. Let x be w(a). Let v be (-1)/(-2)*(x + 2). Solve 3*d - 3*r = 5 + 4, -r + 2 = v for d. 5 Suppose -2*p - 5*g + 3 - 8 = 0, p - 8 = g. Let j = 26188 - 26177. Solve -5*b + p = 5*r, 0 = 2*r - 3*r + 3*b - j for r. -2 Suppose 3*k = 4*w + 72, 443*k - 444*k = 2*w - 34. Solve -3*u = 2*t - 4*t - 8, 0 = -4*t - 5*u + k for t. 2 Suppose -u + 5 + 1 = 0. Suppose -u*i = -288 + 276. Solve n + i = 2*s + 5*n, s = 2*n + 9 for s. 5 Let n(z) = -3*z**2 - 118*z + 80. Let w be n(-40). Suppose w = -23*f - 11 + 11. Solve 0 = -4*d + 2*r + 2, 5*d - 2*r + 5*r + 25 = f for d. -2 Let x(s) = 1 - 6*s + 10*s - 1 + 8*s**2 - 2. Let o be x(-1). Solve -o*f - 3*v - v = -6, 0 = 3*f + 2*v - 9 fo
Low
[ 0.51025641025641, 24.875, 23.875 ]
Q: Why does pressure relief valve state 'Not for Use with Water Heaters'? So I replaced my 6.5 year old electric hot water (installed with house built in 06') heater and used an identical plumbing setup as my previous install. My previous (and now current) install has a 3/4" pressure relief valve in the cold water inlet. As explained to me, this is a 1st fail-safe to allow the water heater to relief pressure and not wait for the 150 psi T&P valve to blow out water. Basically it's a '1st level backup'. The relief valve in question, is this 3/4 in. Relief Valve. All is good and the new water heater is working and flowing great. But I looked up the relief valve I bought and re-installed (identical to the previous valve installed) and there was the following note: Not for use with water heaters OK this concerned me a bit because it was installed with the original hot water heater when the house was built. I see the another comment: The solid-brass design meets federal low lead regulation OK so 'lead' makes me concerned even though it meets requirements. So here are my main questions: Does it say 'Not for Use with Water Heaters' because it is not intended to be a replacement for a T&P valve which operates at a higher temperature and pressure along with a relief valve on the unit? Is it not for use with hot water heaters because it has the potential to have a lead containment that will leak into the water? I prefer a definitive answer as opposed to guesses obviously and responses from anyone who is familiar with that relief valve. A: While I can't provide a definitive answer, since I'm not the manufacturer, nor do I, or have I ever worked for the manufacturer. I can try to provide a logical, fact based answer that may be close to the truth. Heat Expansion When water is heated, the pressure in a closed system increases. If the pressure increases beyond the tripping point of the T&P valve on the heater, the valve should open to release some of the pressure. This release usually involves very hot water and steam, released in a controlled manner. If you install a pressure relief valve set lower than the T&P trip value, The relief valve will open long before the T&P valve possibly releasing hot water and steam in an uncontrolled way. This could lead to injury to occupants, or damage to property. It's possible that your area has not adopted the use of backflow prevention, so this extra pressure can simply be released back through the distribution system. In which case, you'll probably never see either relief valve ever open. If you do have backflow prevention in place, it's possible that this relief valve could open under "normal" conditions. The International Residential Code (IRC), and Uniform Plumbing Code (UPC) recommend pressure between 40 - 80 psi. IRC 2009 P2903.3 Minimum pressure. Minimum static pressure (as determined by the local water authority) at the building entrance for either public or private water service shall be 40 psi (276 kPa). P2903.3.1 Maximum pressure. Maximum static pressure shall be 80 psi (551 kPa). When main pressure exceeds 80 psi (551 kPa), an approved pressure-reducing valve conforming to ASSE 1003 shall be installed on the domestic water branch main or riser at the connection to the water-service pipe. So even under "normal" conditions, your 75 psi valve could open. Controlling Expansion in a Closed System If backflow prevention has been used in your home, you are required by code to install a device for controlling pressure. IRC 2009 P2903.4 Thermal expansion control. A means for controlling increased pressure caused by thermal expansion shall be installed where required in accordance with Sections P2903.4.1 and P2903.4.2. P2903.4.1 Pressure-reducing valve. For water service system sizes up to and including 2 inches (51 mm), a device for controlling pressure shall be installed where, because of thermal expansion, the pressure on the downstream side of a pressure-reducing valve exceeds the pressure-reducing valve setting. P2903.4.2 Backflow prevention device or check valve. Where a backflow prevention device, check valve or other device is installed on a water supply system using storage water heating equipment such that thermal expansion causes an increase in pressure, a device for controlling pressure shall be installed. While a relief valve may fit this description, the more common method is to install an expansion tank. Safely Releasing Pressure There are requirements for releasing pressure by way of a discharge pipe, which this valve may not meet. IRC 2009 P2803.6.1 Requirements for discharge pipe. The discharge piping serving a pressure-relief valve, temperature relief valve or combination valve shall: Not be directly connected to the drainage system. Discharge through an air gap located in the same room as the water heater. Not be smaller than the diameter of the outlet of the valve served and shall discharge full size to the air gap. Serve a single relief device and shall not connect to piping serving any other relief device or equipment. Discharge to the floor, to the pan serving the water heater or storage tank, to a waste receptor or to the outdoors. Discharge in a manner that does not cause personal injury or structural damage. Discharge to a termination point that is readily observable by the building occupants. Not be trapped. Be installed to flow by gravity. Not terminate more than 6 inches (152 mm) above the floor or waste receptor. Not have a threaded connection at the end of the piping. Not have valves or tee fittings Be constructed of those materials listed in Section P2905.5 or materials tested, rated and approved for such use in accordance with ASME A112.4.1. Lead Safe After doing a bit or research, I stumbled upon the NSF website which provides a lot of valuable information. It turns out, the valve mentioned in the question is indeed certified to meet ANSI/NSF 61, ANSI/NSF 61 Annex G, and California's AB 1953. Which means it is safe for use with potable water (at least as far as lead is concerned). If you check the valve and/or packaging, you'll likely notice the NSF mark. If you have any other fittings or products you'd like to check out, you can Search for NSF Certified Products. tl;dr This valve is not designed (or was not tested) to meet the codes and standards for a pressure relief valve on, or near a water heater. So the manufacturer was forced to mark the fitting "Not for use with water heaters". A: As for the lead concern: virtually all brass contains lead, even so-called "lead-free brass". As long as it meets federal regulations I don't see a concern. Wouldn't you be more concerned if it didn't meet code? Besides, if this is on the inlet to a hot water heater, presumably nobody will be drinking the water on a regular basis, so in my mind it's a total non-issue.
Low
[ 0.5355329949238571, 26.375, 22.875 ]
TO BE PUBLISHED IN THE OFFICIAL REPORTS OFFICE OF THE ATTORNEY GENERAL State of California DANIEL E. LUNGREN Attorney General ______________________________________ OPINION : : No. 95-302 of : : December 20, 1995 DANIEL E. LUNGREN : Attorney General : : ANTHONY S. Da VIGO : Deputy Attorney General : : ______________________________________________________________________________ THE HONORABLE MILTON MARKS, MEMBER OF THE CALIFORNIA STATE SENATE, has requested an opinion on the following questions: 1. May a county rent space to a private, non-profit organization for the operation of a contemporary art museum in a building maintained by the county for use of a veterans' association, where the veterans' association has not violated the terms or conditions of the county's dedication for such use, has not consented to the revocation of the dedication for such use, and has not abandoned its use of the building? 2. May a charter county revoke its dedication of a building for use of a veterans' association without substituting alternative facilities, where the veterans' association has not violated the terms or conditions of the county's dedication for such use, has not consented to the revocation of the dedication for such use, and has not abandoned its use of the building? CONCLUSIONS 1. A county may rent space to a private, non-profit organization for the operation of a contemporary art museum in a building maintained by the county for use of a veterans' association, even though the veterans' association has not violated the terms or conditions of the county's dedication for such use, has not consented to the revocation of the dedication for such use, and has not abandoned its use of the building, provided that the use of the building as a museum is incidental to, consistent with, and does not unduly interfere with the reasonable use of the building by the veterans' association. 1. 95-302 2. A charter county may not revoke its dedication of a building for use of a veterans' association without substituting alternative facilities, where the veterans' association has not violated the terms or conditions of the county's dedication for such use, has not consented to the revocation of the dedication for such use, and has not abandoned its use of the building. ANALYSIS Pursuant to the provisions of Military and Veterans Code section 1262,1 the board of supervisors of a county may "provide, maintain or provide and maintain buildings, memorial halls, meeting places, memorial parks, or recreation centers for the use or benefit of one or more veterans' associations." (See Wall v. State of California (1946) 73 Cal.App.2d 838, 840-841; 62 Ops.Cal.Atty.Gen. 655 (1979).) The provision of such a facility pursuant to section 1262 and its acceptance by the veterans' association constitutes a dedication for such use and benefit. (' 1266.) The two questions presented for consideration require an interpretation of section 1266. Specifically, it must be determined whether space within a building dedicated for use of a veterans' association may be rented for the operation of a contemporary art museum and whether a charter county may revoke a dedication for such use without providing an alternative facility to the veterans' association in the absence of a violation, consent, or abandonment by the association. Section 1266 provides: "Whenever a county has provided, maintained, or provided and maintained any building, memorial hall, meeting place, memorial park, or recreation center for the use or benefit of one or more veterans' associations, pursuant to Section 1262, the provision of that facility and its acceptance by the veterans' association constitutes a dedication of that property to a public purpose, and the county may not revoke the dedication, so long as the veterans' association has not violated the terms and conditions of the dedication, unless it dedicates substitute facilities or unless the veterans' organization has either consented to the proposed county action or has abandoned its use of the facilities." 1. Rental of Dedicated Space In Allied Architects' Assn. v. Payne (1923) 192 Cal. 431, the Supreme Court held that the dedication of a building by a county for the exclusive use of a veterans' association did not violate the constitutional prohibition against the making of gifts of public funds. After a lengthy analysis the court concluded: "It follows from what has been said that the board of supervisors, acting in pursuance of section 4041f of the Political Code [now section 1262], is empowered to erect as a memorial hall the building to be known and designated as Victory Hall. Furthermore, it is empowered to limit the use of the hall to a meeting place for associations of veterans who have served the United States honorably in its wars. We 1 All section references herein are to the Military and Veterans Code. 2. 95-302 do not, however, wish to be understood as holding that the legislature has not the power to enlarge the scope of the use of the hall to include kindred organizations or to open it to the public at large if future exigencies indicate that a wider use of the hall would enhance its usefulness and better subserve the public needs." (Id., at p. 440.) Six years later in Gridley Camp No. 104 v. Board of Supervisors (1929) 98 Cal.App. 585, the Court of Appeal explained the Payne decision as follows: "In behalf of the petitioners it is argued that the case of Allied Architects' Association of Los Angeles v. Payne, 192 Cal. 431, holds and adjudges that the Board of Supervisors, or the committee or custodian placed in charge of such building possesses no authority to permit the use thereof by any other than a veteran association. While there is language in the opinion in that case which is open to the construction that the author of the opinion entertained the idea that such buildings should properly be limited to the exclusive use of such organizations, and the case does hold that the Board of Supervisors may erect a building under the act which is devoted exclusively to the use of such organizations, the case does not go to the extent contended for by the petitioners. It is to be observed also that the case primarily was based upon a resolution of the Board of Supervisors of the county of Los Angeles, which specified that the building to be erected should be exclusively used as a meeting place for patriotic, fraternal and benevolent associations `whose membership shall be composed only of veterans,' etc. "While we are of the opinion that under the section of the Political Code authorizing the construction of memorial buildings, boards of supervisors possess the authority and power to limit the use thereof and of every room therein, exclusively to veterans, it does not follow that the language should be so narrowly construed as to prevent the incidental use thereof or the incidental use of the rooms therein, such as the main auditorium, in such a manner as not to interfere with the main purposes for which the building has been erected, and at times when such rooms would otherwise be vacant. While the section of the code authorizes the construction of such buildings, in the nature of things and in the ordinary course of events associations of veterans of wars that are past will cease to be. This is peculiarly applicable to cities no larger than the town of Gridley and it would be carrying the idea further than we think the language of the act requires to hold that when the veteran associations referred to have ceased to be, the building must remain vacant or stand as an empty monument. The complaint in this case is directed particularly to the use permitted of the auditorium, but from the facts before us it is apparent that the auditorium having a seating capacity of 1200 is designed for use only on special occasions, and under such circumstances we see no reason why the Board of Supervisors or the committee placed by it in control of the building, should not allow the incidental use of the auditorium for purposes not inconsistent with the objects for which the building was erected, or which do not obstruct or interfere with the use of the building by the different veteran organizations, either free of charge or for a stated compensation, and thus aid in defraying the expenses of maintaining the building." (Id., at pp. 591-592.) 3. 95-302 On numerous occasions we have alluded to the issue of the incidental use of dedicated facilities. In 5 Ops.Cal.Atty.Gen. 155 (1945), for example, we concluded that a board of supervisors may allow the use of a veterans' memorial hall by a non-veterans organization, where such use is not specifically restricted and would not interfere with its use by veterans. Similarly, in 13 Ops.Cal.Atty.Gen. 56 (1949), respecting the use of such a facility in Imperial County, we stated in part: ". . . We think, therefore, that the construction should be that where a veterans' association is given the use of the building for a regular meeting place or recreation center, such organization must be composed solely of veterans, but that this should not prohibit the supervisors from permitting the use of such buildings or parts thereof for other purposes incidental to the main purpose by the State and Federal Governments if the board, in the exercise of a sound discretion, determines that such use will not interfere with the main use or purpose for which such buildings were constructed." (Id., at p. 60; see also 16 Ops.Cal.Atty.Gen. 64 (1950).) In 1955 the Legislature essentially codified the Gridley decision by enacting section 1264. (Stats. 1955, ch. 1604, ' 1.) Section 1264 provides: "The governing body maintaining any facilities constructed or maintained pursuant to this chapter may provide for the use of such facilities by persons or organizations other than veterans, either free of charge or for stated compensation to aid in defraying the cost of maintenance, for any purpose not inconsistent with the continued use pursuant to this chapter, when such use will not unduly interfere with the reasonable use of the facilities by veterans' associations." In 1989, however, the Legislature enacted section 1266, as set forth at the outset. (Stats. 1989, ch. 102, ' 1.) Section 1266 speaks of the provision by a county of a facility and its acceptance by a veterans' association as a "dedication" to a public purpose. Does such terminology affect or modify in any respect the right of a board of supervisors under the terms of section 1264 to provide for the use of a dedicated facility by persons other than veterans? In our view neither the term "dedication" nor the language of section 1266 as a whole has any such effect. First, section 1266 pertains specifically to the revocation of a dedication, as distinguished from a county's authority to allow consistent uses of a dedicated facility. Second, the words of a statute must be construed in context, keeping in mind the statutory purpose, and statutes or sections relating to the same subject must be harmonized, both internally and with each other, to the extent possible. (Walnut Creek Manor v. Fair Employment & Housing Com. (1991) 54 Cal.3d 245, 268; 78 Ops.Cal.Atty.Gen. 253, 260 (1995); 78 Ops.Cal.Atty.Gen. 247, 251 (1995).) We may assume that had the Legislature intended to modify the meaning of section 1264 and the longstanding judicial precedent embodied therein, it would have amended that section so as to conform with such intention. (Cf. 78 Ops.Cal.Atty.Gen., supra, at 260; 75 Ops.Cal.Atty.Gen. 256, 260 (1992).) Third, the Legislature, at the time of the enactment of section 1266, expressly stated in an uncodified provision: "It is the intent of the Legislature, in enacting Section 1266 of the Military and Veterans Code, to codify the holding of the court in the case of Gridley Camp No. 104 v. Board of Supervisors, 98 Cal.App. 4. 95-302 585." (Stats. 1989, ch. 102, ' 2.) The grant of authority contained in section 1264 thus remains unchanged by the enactment of section 1266. Accordingly, it is concluded that a county may rent space to a private, non-profit organization for the operation of a contemporary art museum in a building maintained by the county for the use of a veterans' association, even though the veterans' association has not violated the terms or conditions of the county's dedication for such use, has not consented to the revocation of the dedication for such use, and has not abandoned its use of the building, provided that the use as a museum is incidental to, consistent with, and does not unduly interfere with the reasonable use of the building by the veterans' association. 2. Revocation of Dedication The second inquiry concerns a charter county's revocation of the dedication for use of a county building by a veterans' association. Section 1266 prescribes the conditions under which a dedication may be revoked where the veterans' association has not violated the terms and conditions of the dedication, has not consented to the revocation, and has not abandoned its use of the facility. The principal obligation of the county under these circumstances would be to dedicate a substitute facility.2 The question remains, however, whether the requirements of sections 1262-1266 are applicable to a charter county. Does having a charter mean that a county need not follow the Legislature's statutory requirements? The scope of authority reserved to a county by charter is more restricted than in the case of charter cities. (64 Ops.Cal.Atty.Gen. 234, 237-238 (1981); 61 Ops.Cal.Atty.Gen. 31, 33 (1978).) Specifically, the rule with respect to a charter county is that its legislation may supersede conflicting state law only as to those matters which are actually contained in the charter pursuant to express constitutional authorization. (Cal. Const., art. XI, '' 3, 4; 67 Ops.Cal.Atty.Gen. 402, 403-404 (1984); 61 Ops.Cal.Atty.Gen. 512, 519 (1978).) Here no such express authorization may be found in the Constitution. Further, with respect to matters of statewide concern, county charters are always subordinate to general laws. (Shean v. Edmunds (1948) 89 Cal.App.2d 315; 61 Ops.Cal.Atty.Gen., supra, at 33-34.) We entertain no doubt that the establishment and maintenance of facilities for veterans' associations throughout California are matters of statewide interest. The welfare of veterans and the promotion of patriotism are not peculiarly incidental to any particular local concern. On the contrary, the broader public purposes of veterans' associations were clearly envisioned by the Supreme Court in Allied Architects' Assn. v. Payne, supra, 192 Cal. at 434-435: "It is settled beyond question that the promotion of patriotism, involving as it does the sense of self-preservation, is not only a public purpose but the most elemental of public purposes. [Citations.] The continuity of our governmental institutions is dependent in a large measure upon the perpetuation of a patriotic impulse which is but 2 We have previously determined that a dedication may, in the event of a substantial abandonment, be withdrawn without the necessity of dedicating a substitute facility. (20 Ops.Cal.Atty.Gen. 199 (1952).) 5. 95-302 the willingness to sacrifice all for the ideas and the ideals which form the foundation stones of our republic . . . . It is conceded, as indeed it must be, that the erection of a building as a memorial hall, to the extent that it would serve as a stimulus to patriotism, would be for a public purpose. [Citations.] ". . . To permit the men whose associations have been effected for the purpose of inculcating and promoting patriotism to use the vacant halls as a rendezvous for revivifying and broadcasting the spirit of patriotism throughout the length and breadth of the land is clearly a public . . . purpose. ". . . And the determination of the legislature to make the memorial hall in question a living force for the promulgation of patriotic principles by dedicating its use to associations created to foster the spirit of patriotism . . . was certainly a wise and commendable exercise of legislative power." Inasmuch as the power to establish and maintain a building for the use and benefit of a veterans' association is not expressly included in the Constitution among those which may be contained in a county charter and is further a matter of statewide concern, the terms and requirements of sections 1262-1266 govern charter counties. (Cal. Const., art. XI, ' 1, subd. (b).)3 It is concluded that a charter county may not revoke its dedication of a building for use of a veterans' association without substituting alternative facilities, where the veterans' association has not violated the terms or conditions of the county's dedication for such use, has not consented to the revocation of the dedication for such use, and has not abandoned its use of the building. ***** 3 A charter city and county has the same authority with respect to municipal affairs as does a charter city. (Cal. Const., art. XI, ' 6; West Coast Adver. Co. v. San Francisco (1939) 14 Cal.2d 516, 520-522; 61 Ops.Cal.Atty.Gen., supra, at 518, fn. 6.) Nevertheless, the same result would ensue for purposes of this inquiry. Where a charter city legislates with respect to municipal affairs, its charter prevails over the general laws. (Cal. Const., art. XI, ' 5, subd. (a).) As to matters of statewide concern, however, charter cities remain subject to state law. (Johnson v. Bradley (1992) 4 Cal.4th 389, 397-400; California Fed. Savings & Loan Assn. v. City of Los Angeles (1991) 54 Cal.3d 1, 16-18; 78 Ops.Cal.Atty.Gen. 143, 148-150 (1995).) 6. 95-302
Mid
[ 0.613513513513513, 28.375, 17.875 ]
This subproject is one of many research subprojects utilizing the resources provided by a Center grant funded by NIH/NCRR. Primary support for the subproject and the subproject's principal investigator may have been provided by other sources, including other NIH sources. The Total Cost listed for the subproject likely represents the estimated amount of Center infrastructure utilized by the subproject, not direct funding provided by the NCRR grant to the subproject or subproject staff. Vaginal ring devices are being developed to provide sustained release of HIV microbicides. To date, only limited pharmacokinetic data is available from animal or human studies. Here we are determining the pharmacokinetic (PK) and pharmakodynamics (PD) or microbicide candidates CMPD167 and maraviroc in vaginal fluids and plasma after delivery in various formulations including saline, hydroxyethylcellulose gel, silicone elastomer gel, and solid vaginal ring formulations. We have found that gels deliver a very high and rapid dose to the vagina, which is partly absorbed in the systemic circulation (plasma). The delivery by gels is also more sustained compared to PBS, but inferior to ring formulations after a few hours. Rings deliver a semi-constant rate of microbicide delivery over time (28 days is what we have tested to date) and we have now switched to vaginal rings for most of our microbicide testing. Currently we have a series of ongoing studies testing the ability of microbicides formulated in rings (CMPD167 and maraviroc) to prevent SHIV vaginal transmission in challenge experiments.
High
[ 0.6721088435374151, 30.875, 15.0625 ]
Q: What to use in place of $.mobile.changePage()? The release notes of jQuery Mobile 1.4.0 RC1 marks $.mobile.changePage() as deprecated. Which API method replaces it? Thanks. A: $(":mobile-pagecontainer").pagecontainer("change", "#page", { options });
High
[ 0.663087248322147, 30.875, 15.6875 ]
If this opinion indicates that it is “FOR PUBLICATION,” it is subject to revision until final publication in the Michigan Appeals Reports. STATE OF MICHIGAN COURT OF APPEALS DAVID SUTTON, UNPUBLISHED January 14, 2020 Plaintiff-Appellant, v No. 345716 Oakland Circuit Court ADVANCE PHARMACEUTICAL, INC, LC No. 2014-144679-CZ Defendant-Appellee. Before: RIORDAN, P.J., and SAWYER and JANSEN, JJ. PER CURIAM. In this products liability based personal injury action, plaintiff appeals as of right the order granting summary disposition in favor of defendant under MCR 2.116(C)(10). We affirm. I. RELEVANT FACTUAL AND PROCEDURAL BACKGROUND This is the third appeal in this matter. See Sutton v Advance Pharmaceutical, Inc. (Sutton I), unpublished per curiam opinion of the Court of Appeals, issued October 25, 2016 (Docket No. 328038); Sutton v Advance Pharmaceutical, Inc. (Sutton II), unpublished per curiam opinion of the Court of Appeals, issued March 13, 2018 (Docket No. 336526). In plaintiff’s first appeal, this Court summarized that, This action arises from plaintiff’s claim that he suffered severe injuries when he ingested acetaminophen pills manufactured by defendant. Plaintiff, in pro per, filed his complaint on December 22, 2014, alleging claims of failure to warn, improper labeling, and manufacturing defect; defendant answered on January 29, 2015. On March 27, 2015, plaintiff filed a motion to amend his complaint, in which he moved to state similar claims plus a breach of the implied warranty of marketability. [Sutton I, unpub op at 2.] In his first appeal, plaintiff appealed the trial court’s dismissal of his case for failure to pay a $500 sanction, and this Court reversed and remanded, concluding that the $500 sanction was improper, and the dismissal was an inadequate remedy for failure to pay. Sutton I, unpub op at 4. The case was then remanded for further proceedings consistent with that opinion. Id. -1- After being remanded to the trial court, defendant “moved . . . to compel plaintiff to sign authorization forms for release of his medical records.” Sutton II, unpub op at 1. “Over plaintiff’s physician-patient privilege objections, the trial court granted defendant’s motion[.]” Id. However, plaintiff refused to sign any authorization forms for release of his medical records. The trial court thus “entered an order dismissing plaintiff’s case without prejudice.” Id. Plaintiff’s second appeal to this case followed. Again, this Court reversed and remanded for further proceedings. This Court noted that “defendant sought medical records from plaintiff’s treating physicians to determine whether plaintiff was taking any other medication at the time of the alleged injury that may have caused side effects similar to the ones identified in his complaint.” Id. at 2. Defendant sought this information under MCR 2.314(C)(1) and MCR 2.314(A). However, plaintiff “asserted that the medical records sought by defendant were privileged, and therefore not discoverable. MCR 2.314(C)(1)(b); MCR 2.314(A)(1)(b). Specifically, plaintiff asserted the physician-patient privilege, which has its roots in MCL 600.2157.” Id. at 2-3. This Court correctly concluded that plaintiff was entitled to assert the physician-patient privilege. This Court also explained that under MCL 600.2157, quoted below in relevant part: If the patient brings an action against any defendant to recover for any personal injuries, or for any malpractice, and the patient produces a physician as a witness in the patient’s own behalf who has treated the patient for the injury or for any disease or condition for which the malpractice is alleged, the patient shall be considered to have waived the privilege provided in this section as to another physician who has treated the patient for the injuries, disease, or condition. This provision is called the patient-litigator exception. Landelius v Sackellares, 453 Mich 470, 474; 556 NW2d 472 (1996). However, this Court concluded that the patient-litigator exception did not apply in this case, where: plaintiff is the patient and has brought an action for personal injury against defendant. However, nothing in the record indicates that plaintiff has produced his own treating physician or “produced another treating physician as a witness” which would trigger the application of the patient-litigator exception. In fact, the only witness plaintiff has identified at this point in the litigation is Regan D. Carney, who states in her affidavit that she lived with plaintiff and observed him ingest the pills. Although defendant argues that plaintiff intends to rely on his treating physician, plaintiff’s discovery responses do not support that assertion. Accordingly, because plaintiff has asserted a valid privilege to his medical records, the trial court abused its discretion by ordering plaintiff to sign authorization forms so that defendant could obtain those records. [Sutton II, unpub op at 3-4.] Again, this case returned to the trial court, where the parties continued to engage in written and oral discovery. -2- Eventually, defendant moved for summary disposition under MCR 2.116(C)(10). Defendant ultimately moved for summary disposition under MCR 2.116(C)(10) on July 27, 2018. Defendant explained that it manufactures and packages over-the-counter (OTC) medications such as baby aspirin and acetaminophen, and then distributes these medications to wholesalers. The medications it manufactures are never sold to the public, nor are they packaged for sale to the public. Rather, they are purchased by hospitals, nursing homes, and pharmacies. Defendant admitted that in June 2013, it issued a nationwide recall for its baby aspirin because one pharmacist in Rhode Island noticed that one bottle of baby aspirin looked “markedly different than [it] should,” and actually contained acetaminophen instead of baby aspirin. Now, defendant argued, plaintiff claimed that he ingested acetaminophen instead of baby aspirin after filling prescriptions at a CVS pharmacy in Farmington, Michigan. However, plaintiff admitted at his deposition that he no longer has the bottle or the pills that he ingested because he destroyed them. Moreover, although plaintiff puts his physical condition into controversy, plaintiff refused to disclose his medical records related to his claims, and also refused to sign authorizations for the release of medical records, citing privacy. Although “plaintiff did provide approximately 200 random, piecemealed, and incomplete records from various medical providers ranging from 2005 through 2013, most . . . are handwritten and illegible, without any verification from a custodian of records as to the accuracy or completeness of the records.” Thus, defendant argued, plaintiff is unable to meet his burden and establish multiple essential elements of his claim: liability, damages, and causation. Accordingly, defendant argued it was entitled to summary disposition under MCR 2.116(C)(10). The trial court agreed with defendant, concluding on the record that plaintiff was unable to present any evidence of causation or damages, and therefore defendant was entitled to summary disposition. An order granting defendant’s motion for summary disposition for the reasons stated on the record was entered on September 12, 2018. This appeal followed. II. STANDARD OF REVIEW Defendant moved for summary disposition under MCR 2.116(C)(10). This Court reviews a trial court’s determination on a motion for summary disposition de novo. Cove Creek Condo Assoc, ___ Mich App at ___; slip op at 13. “Summary disposition is proper under MCR 2.116(C)(10) if the affidavits and other documentary evidence show that there is no genuine issue concerning any material fact and that the moving party is entitled to judgment as a matter of law.” Id., quoting Rataj v City of Romulus, 306 Mich App 735, 746; 858 NW2d 116 (2014). Upon being presented with a motion for summary disposition under MCR 2.116(C)(10), a trial court’s “task is to review the record evidence, and all reasonable inferences therefrom, and decide whether a genuine issue of any material fact exists to warrant a trial.” Skinner v Square D Co, 445 Mich 153, 162; 516 NW2d 475 (1994) (footnote omitted). III. ANALYSIS In this case, plaintiff filed a personal injury claim, rooted in products liability, against defendant, the manufacturer of various OTC medications, including baby aspirin and acetaminophen. Plaintiff claims that he filled a prescription for baby aspirin at his local drugstore, and was given a product manufactured by defendant and labeled as baby aspirin. -3- However, instead of baby aspirin in the prescription bottle, it was actually acetaminophen, which upon ingestion, caused plaintiff to suffer “confusion, sweating, extreme fatigue, diarrhea, pain in stomach (especially upper right portion), irregular heartbeat, and pale stools.” Plaintiff claimed that defendant failed to warn plaintiff of an unreasonably dangerous condition where acetaminophen was labeled and sold as baby aspirin, and that ingestion of acetaminophen caused his injury. The trial court concluded that plaintiff was unable to establish causation or damages relating to his claim, and granted summary disposition in favor of defendant. We agree. As our Supreme Court articulated in Skinner, Under Michigan products liability law, as part of its prima facie case, a plaintiff must show that the manufacturer’s negligence was the proximate cause of the plaintiff’s injuries. Brisboy v Fibreboard Corp, 429 Mich 540, 547; 418 NW2d 650 (1988) (emphasis added). We have previously explained that proving proximate cause actually entails proof of two separate elements: (1) cause in fact, and (2) legal cause, also known as “proximate cause.” Moning v Alfono, 400 Mich 425, 437; 254 NW2d 759 (1997). The cause in fact element generally requires a showing that “but for” the defendant’s actions, the plaintiff’s injury would not have occurred. Prosser & Keeton, Torts (5th ed), § 41, p 266. On the other hand, legal or “proximate cause” normally involves examining the foreseeability of consequences, and whether a defendant should be held legally responsible for such consequences. Moning, [400 Mich] at 439. See also Charles Reinhart Co v Winiemko, 444 Mich 579, 586 n 13; 513 NW2d 773 (1994). A plaintiff must adequately establish cause in fact in order for legal cause or “proximate cause” to become a relevant issue. [Skinner, 445 Mich at 162-163.] Additionally, a plaintiff can establish causation through circumstantial evidence. Id. at 164. However, “[t]o be adequate, a plaintiff’s circumstantial proof must facilitate reasonable inferences of causation, not mere speculation.” Id. We conclude that plaintiff is unable to establish cause in fact, through either direct or circumstantial evidence. Therefore, not only does proximate causation not become an issue in this matter, but plaintiff is unable to make his prima facie case, and summary disposition in favor of defendant was appropriate. First, plaintiff is unable to present any physical evidence of legal causation. In his deposition, plaintiff testified that he destroyed both the pills he ingested and the mislabeled bottle that the pills came in. Second, plaintiff is unable to present any documentary evidence to support his claim. Plaintiff admitted in his reply brief filed in this Court that he never sought medical treatment for his alleged injuries. Thus, there are no medical records to suggest what plaintiff may have ingested to cause his injuries, or the extent to which he was injured. -4- Finally, plaintiff cannot present any testimonial evidence regarding causation. Plaintiff planned to present the testimony of his roommate, as well as his own testimony, to establish both causation and damages. Although plaintiff’s testimony and the testimony of his roommate is fact-based, it is merely lay witness testimony, and does not take the place of medical witness testimony or expert witness testimony that would support plaintiff’s theory of causation. Indeed, any testimonial evidence on causation offered by plaintiff or his roommate is speculative and merely conjecture. We note that the parties in this case focus most of their arguments on the applicability of MCR 2.314(B)(2). Here, plaintiff has repeatedly refused to sign authorizations for release of his medical records relating to the injuries claimed in this case. Thus, because plaintiff’s medical history and physical condition are relevant, yet plaintiff claims his medical information is subject to privilege and has prevented discovery of his medical information, MCR 2.314(B)(2) would prevent plaintiff from “present[ing] or introduce[ing] any physical, documentary, or testimonial evidence relating to the party’s medical history or mental or physical condition.” However, plaintiff has admitted there are no medical records to be discovered because he never sought medical treatment for his alleged injuries. The applicability of MCR 2.314(B)(2) in this matter is therefore a moot issue. Because plaintiff cannot establish causation, he cannot establish a prima facie products liability case. Defendant was therefore entitled to summary disposition under MCR 2.116(C)(10), and the trial court did not err by granting summary disposition in favor of defendant. Affirmed. /s/ Michael J. Riordan /s/ David H. Sawyer /s/ Kathleen Jansen -5-
Low
[ 0.46171693735498803, 24.875, 29 ]
I make nerd look good!!! 30 Days of Nerdy Hair I am a nerd for many, many things. Most of them obvious in the nerdiverse, like Star Wars and Buffy. But I am also a nerd for Jane Austen and this 1996 film adaptation is a particular favorite. Starring Gwyneth Paltrow as Emma Woodhouse and Jeremy Northam as the dashing Mr. Knightly. I’m not quite sure how to explain this one. I just sort of parted my hair in the middle and started rolling large chunks into a bun on top of my head. I left one little piece out by my face to be curled into a ringlet and a big section for a ringlet on the side. Then I tied a big Jane Austen pink bow on the side with the ringlet.
Mid
[ 0.6325167037861911, 35.5, 20.625 ]
In the related art, in video cameras, digital still cameras, or the like, solid-state imaging devices including a CCD (Charge Coupled Device) or a CMOS image sensor are widely used. In these solid-state imaging devices, alight receiving section including photodiode is provided for each pixel, and in the light receiving section, incident light is photoelectrically converted and thereby a signal charge is generated. In a CCD-type solid-state imaging device, the signal charge generated in the light receiving section is transferred to a charge transferring section having a CCD structure, and is converted into a pixel signal in an output section and then is output. On the other hand, in a CMOS-type solid-state imaging devices, the signal charge generated in the light receiving section is amplified for each pixel, and the amplified signal is output as a pixel signal by a signal line. In such a solid-state imaging device, there is a problem in that aliasing occurs inside a semiconductor substrate due to inclined incident light or incident light that is diffusely reflected at an upper portion of the light receiving section, and thereby optical noise such as smearing and flaring occurs. Therefore, in JP-A-2004-140152, in regard to the CCD-type solid-state imaging device, there is disclosed a technology for suppressing the occurrence of smearing by forming a light shielding film provided at an upper portion of the charge transferring section in a manner to be embedded in a groove portion formed in the interface of the light receiving section and a read-out gate section. However, in the technology disclosed in JP-A-2004-140152, since the light shielding film is formed in the groove portion formed by using a LOCOS oxide film, it is difficult to form the light shielding film at a deep portion of the substrate, and thereby it is difficult to reliably prevent the inclined incident light, which is a cause of smearing, from being incident. In addition, since the pixel area is diminished in proportion to the embedding depth of the light shielding film, it is basically difficult to deeply embed the light shielding film. However, in recent years, accompanying the miniaturization and lowering of power consumption of a video camera or a digital still camera, and a mobile phone with camera, the CMOS-type solid-state imaging device is frequently used. In addition, as the CMOS-type solid-state imaging device, a front-surface irradiation type shown in FIG. 24 and a rear-surface irradiation type shown in FIG. 25 are known. As shown in a schematic configuration diagram of FIG. 24, a front-surface irradiation type solid-state imaging device 111 is configured to have a pixel region 113 in which a plurality of unit pixels 116 including a photodiode PD serving as a photoelectric conversion section and a plurality of pixel transistors is formed in a semiconductor substrate 112. Although the pixel transistor is not shown, a gate electrode 114 is shown in FIG. 24 and this indicates schematically the presence of the pixel transistor. Each photodiode PD is separated by a device separating region 115 composed of an impurity diffused layer, and a multi-layered interconnection layer 119 where a plurality of interconnections 118 are disposed via an interlayer insulating film 117 are formed on a front-surface side of the semiconductor substrate 112 where the pixel transistor is formed. The interconnection 118 is formed except for a portion corresponding to the location of the photodiode PD. An on-chip color filter 121 and an on-chip microlens 122 are sequentially formed on the multi-layered interconnection layer 119 via a planarized film 120. The on-chip color filter 121 is configured by arranging each color filter of, for example, red (R), green (G), and blue (B). In the front-surface irradiation type solid-state imaging device 111, a front surface of a substrate where the multi-layered interconnection layer 119 is formed is set as a light receiving plane 123, and light L is incident from the front surface side of the substrate. On the other hand, as shown in a schematic configuration diagram of FIG. 25, a rear-surface irradiation type solid-state imaging device 131 is configured to have the pixel region 113 in which a plurality of unit pixels 116 including a photodiode PD serving as a photoelectric conversion section and a plurality of pixel transistors are formed in the semiconductor substrate 112. Although not shown, the pixel transistor is formed in the substrate front-surface side, and the gate electrode 114 is shown in FIG. 25 and this indicates schematically the presence of the pixel transistor. Each photodiode PD is separated by the device separating region 115 composed of an impurity diffused layer, and the multi-layered interconnection layer 119 where a plurality of interconnections 118 are disposed via the interlayer insulating film 117 is formed on a front-surface side of the semiconductor substrate 112 where the pixel transistor is formed. In the rear-surface irradiation type, the interconnection 118 may be formed regardless of the position of the photodiode PD. In addition, on a rear surface that the photodiode PD of the semiconductor substrate 112 faces, an insulating layer 128, the on-chip color filter 121, and on-chip microlens 122 are sequentially formed. In the rear-surface irradiation type solid-state imaging device 131, the rear surface of the substrate, which is opposite to the substrate front-surface side where the multi-layered interconnection layer and the pixel transistor are formed, is set as a light receiving plane 132, and light L may be incident from the rear surface-side of the substrate. Increasing integration of a device through the miniaturization of the pixels has been demanded. However, the front-surface irradiation type solid-state imaging device 111 has a configuration where the light L is received by the photodiode PD through the multi-layered interconnection layer 119. Therefore, accompanying the progress of increasing integration and the miniaturization of the pixels, there is a problem in that it is difficult to sufficiently secure a light receiving section region due to an obstacle such as the interconnection, and thereby sensitivity is decreased or shading increases. On the other hand, in the rear-surface irradiation type solid-state imaging device 131, the light L can be incident to the photodiode PD without being subjected to a restriction due to the multi-layered interconnection layer 119, such that it is possible to broaden the opening of the photodiode PD and thereby it is possible to realize increased sensitivity.
Mid
[ 0.562076749435665, 31.125, 24.25 ]
Russian media reports say a journalist who has criticized the government has died in unexplained circumstances in the Siberian region of Buryatia. Thirty-five-year-old Yevgeny Khamaganov died in a hospital emergency room in Buryatia's capital, Ulan-Ude, on March 16, according to local media reports. The cause of death was unclear and there has been no official statement. Some reports cited friends as saying Khamaganov was hospitalized on March 10 after he was severely beaten by unknown assailants. Other reports say he was rushed to the hospital due to complications from diabetes. Khamaganov was known for articles criticizing policies of Russia’s federal government. Khamaganov, an ethnic Buryat, left Ulan-Ude for his native village in 2015, after he was severely beaten by attackers who broke his neck. But he moved back to Ulan-Ude on February 27. Mongol-speaking Buryats make up less than a half of Buryatia’s population of some 1 million people. With reporting by babr.ru, vt-inform.ru, and arigus.tv
Mid
[ 0.59322033898305, 35, 24 ]
/* * Copyright (c) 2018. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.itfsw.mybatis.generator.plugins.utils.hook; import org.mybatis.generator.api.IntrospectedColumn; import org.mybatis.generator.api.dom.xml.Element; import org.mybatis.generator.api.dom.xml.XmlElement; import java.util.List; /** * --------------------------------------------------------------------------- * * --------------------------------------------------------------------------- * @author: hewei * @time:2018/4/28 17:50 * --------------------------------------------------------------------------- */ public interface IIncrementsPluginHook { /** * 生成增量操作节点 * @param introspectedColumn * @param prefix * @param hasComma * @return */ List<Element> incrementSetElementGenerated(IntrospectedColumn introspectedColumn, String prefix, boolean hasComma); /** * 生成增量操作节点(SelectiveEnhancedPlugin) * @param columns * @return */ List<XmlElement> incrementSetsWithSelectiveEnhancedPluginElementGenerated(List<IntrospectedColumn> columns); /** * 是否支持increment * @param column * @return */ boolean supportIncrement(IntrospectedColumn column); }
Mid
[ 0.631372549019607, 40.25, 23.5 ]
Heather Singmaster, associate director of the Center for Global Education at Asia Society, curates this group blog in which education leaders discuss global competence based on best practices from around the world. Follow Asia Society on Twitter. Why Languages Can Make Us Smarter, Safer, and Better Looking This week more than 1,100 Chinese language teachers are gathering in Washington, DC for the annual National Chinese Language Conference. I've asked Chris Livaccari to share the spirit of the event. by Chris Livaccari In the language education business, there are basically two kinds of arguments in support of language programs. The first is a national security or competitiveness one that emphasizes the importance of languages for intelligence gathering, military and economic competition, and generally appeals to political and business leaders—i.e., "this can make our nation stronger" arguments. The second is a more nuanced one about the cognitive and cultural benefits of language learning, and one that plays well with people in education, the arts, academia, and many parents—i.e., "this can make my kid smarter" arguments. It is interesting that both of these motivations for language learning have recently received prominent media attention. A March 17, 2012 New York Times article on "Why Bilinguals are Smarter" touts the advantages of bilinguals over monolinguals at every stage of life, from infancy to old age. A Council on Foreign Relations (CFR) report on "U.S. Education Reform and National Security" published around the same time to much media fanfare proposes that "if all Americans grew up proficient in at least one language in addition to English, and if instruction about other countries' histories and cultures were built into the standard K-12 curriculum, young people would develop better understandings of world cultures and be better equipped to converse, collaborate, and compete with peers worldwide." This "collaborate/compete" mantra has become probably the single most used argument for multilingualism and global competence in education. This is all music to the ears of language educators, as I think we all like to imagine a world in which learning more languages makes us smarter and happier, and builds a stronger, more secure nation. Both the New York Times and CFR pieces suggest that there is growing acknowledgement of the benefits of language learning and more support for schools offering a wide range of high-quality language options for students. Both also make reference to the benefits of starting language study at an early age, and of the critical link between language learning and the development of other cognitive and academic skill sets. One of the great test cases for the benefits of both early language learning and the connections between language and other areas is the growing interest in language immersion programs, most of which begin in the early grades. These are programs in which students both learn a new language and take a portion of their content area courses in that language. There are different models of immersion, such as 80-20 or 50-50—that is to say, students spend 80% of their school day in a new language (learning science, math, and social studies in French, for example) and 20% of their school day in their native language (language arts and music classes in English, for example), or 50% of the day in each language, etc. But whatever the model, these immersion programs get one thing obviously right: they start early and give students the best chance of building toward advanced language proficiency. Most Americans probably start learning a foreign language in middle or high school, and perhaps study for two or three years without developing much proficiency because the programs in which they study are not robust enough and don't start early enough to give them that opportunity. So whether you are more on the "collaborate" side of the house or more on the "compete" side, it's clear that early language learning should be a national priority and one that can make our young people both smarter and safer. Beyond language proficiency, it is important that students have the opportunity to develop a broader skill set that teaches them how to identify and analyze patterns in language and culture, and how to apply an understanding of those patterns to communicating with a wide variety of audiences. While this enhanced ability to communicate, collaborate, and connect across linguistic, cultural, and national borders may not actually improve our chances of dating a supermodel, it will make us look a lot better to the rest of the world. It also makes the prospect of America remaining a nation that can lead and innovative look a lot better too! Categories: Notice: We recently upgraded our comments. (Learn more here.) If you are logged in as a subscriber or registered user and already have a Display Name on edweek.org, you can post comments. If you do not already have a Display Name, please create one here. Ground Rules for Posting We encourage lively debate, but please be respectful of others. Profanity and personal attacks are prohibited. By commenting, you are agreeing to abide by our user agreement. All comments are public. The opinions expressed in Global Learning are strictly those of the author(s) and do not reflect the opinions or endorsement of Editorial Projects in Education, or any of its publications.
High
[ 0.6783310901749661, 31.5, 14.9375 ]
A Tasmanian academic who wrote an opinion piece defending Cardinal George Pell and describing his "accusers" as "wicked" has apologised for the article, which the Catholic Church has since pulled. Key points: The Hobart Archdiocese said concerns were raised about an opinion piece in this month's Catholic Standard on Friday morning The Hobart Archdiocese said concerns were raised about an opinion piece in this month's Catholic Standard on Friday morning It was immediately withdrawn from distribution, with an amended version to be published next week It was immediately withdrawn from distribution, with an amended version to be published next week The author said he was not criticising victims but "public figures and journalists who contributed to a toxic environment in which justice would struggle to prevail" Pell has been convicted of sexually abusing two choirboys while he was the archbishop of Melbourne in the 1990s. He is due to be sentenced on March 13 but has already lodged an appeal. The director of Hobart's Christopher Dawson Centre for Cultural Studies, David Daintree, wrote the article in this month's edition of the Catholic Standard, which was to be distributed this weekend. At least one church in Hobart had already received the publication before the opinion piece was pulled. "I know Cardinal Pell well. I like him and respect him. I simply cannot believe that he is guilty, " Dr Daintree wrote in the piece. "Pell is a tough man and he will, by the grace of God, survive the wickedness of his accusers and the silence of many who should defend him but won't." The Archdiocese of Hobart said a decision was taken to "immediately" withdraw the publication from distribution after concerns were raised about the op-ed. Author believes journalists created 'toxic environment' In a written apology issued by the Archdiocese, Dr Daintree said he apologised "unreservedly" for any offence he may have caused. "It was never my intention to cast doubt on survivors. I'd also like to make it very clear that the views were mine alone and in no way represented those of the Archdiocese of Hobart," Dr Daintree said. David Daintree is the director of the Christopher Dawson Centre for Cultural Studies. ( Blogspot: David Daintree ) In an email, Dr Daintree provided an additional statement to the ABC, and said he was aware his article had caused "grave offence due to sharp criticism of Cardinal Pell's 'accusers'". "Please note that I did not use the term 'victims': the focus of my thinking was only on public figures and journalists who in the months and even years preceding the trial did all they could to besmirch the Cardinal's reputation," Dr Daintree said. "In my view they contributed to the growth of a toxic and hostile environment in which justice would struggle to prevail." Anglican Church abuse survivor and Beyond Abuse founder Steve Fisher described the comments in the opinion piece as "disgraceful" and "disgusting." "Especially given that they are about Cardinal Pell and they come at a time when survivors are really hoping that the guilty verdict of Pell may change the way the Church treats survivors," Mr Fisher said. "The impact [of these comments] on survivors is just basically another kick in the stomach, it's just again another way of putting survivors down." Mr Fisher said Dr Daintree should be sanctioned from writing for any Catholic publication. Dr Daintree said he had also withdrawn the article from the Dawson Centre website and Facebook page. The Archdiocese of Hobart said it strongly condemned all forms of child sexual abuse and was committed to working with victims and their families to address the great suffering they had experienced. An amended version of the Catholic Standard will be published in the coming week. Caution urged over verdict comments Canberra-based Catholic commentator and former priest Paul Collins said that given the current position the Catholic Church was in, its publications should not be commenting on the Pell case. Paul Collins believes most Catholics have accepted the verdict. ( Supplied: Paul Collins ) "I think it's just not right for Catholic publications to be questioning the verdict," he said. "And I think that the Archdiocese of Hobart did exactly the right thing in withdrawing the whole edition." Mr Collins said that while some Catholics were confused about the verdict or questioning it, he believed the majority accepted it. He also said centres such as the Hobart one were often run by just one person who would "espouse the same approach to Catholicism" as Pell did during his tenure as Cardinal. "These centres are offering only a partial view of Catholicism, they represent really a quite small minority within Catholicism," he said. 'Day of prayer' for George Pell cancelled The newspaper withdrawal came the same day the Archdiocese of Melbourne cancelled an event urging parishioners to pray for Pell. A Day of Prayer for Cardinal George Pell was advertised for Saturday March 9. ( Supplied ) Flyers were issued for "A Day of Prayer for Cardinal George Pell" at the Nazareth House Chapel in Camberwell, to be held on Saturday. However, the Catholic Archdiocese of Melbourne confirmed on Friday that the event had been cancelled. The flyer included recent comments from Sydney Archbishop Anthony Fisher. "If we are too quick to judge we can end up joining the demonisers or the apologists, those baying for blood or those in denial," Archbishop Fisher was quoted as saying. "Our [Sunday] readings remind us that things are not always what they seem; that we must look beneath the surface and allow truth and justice to unfold in God's good time." Editor's note: On Tuesday April 7, 2020, the High Court in a unanimous decision upheld Cardinal Pell's appeal and quashed his convictions on all five charges.
Low
[ 0.526096033402922, 31.5, 28.375 ]
Q: Swift Int array every 3 elements sum For example, we have an array [1,2,3,4,5,6,7,8,9,10,11,12] let index1 = 0 let index2 = 0 let index3 = 1+2+3 let index4 = 2+3+4 let index5 = 3+4+5 .... let result = [index1, index2, index3, index4, ...] A: You can iterate your collection indices, add a guard to return zero in case it is less than 2 otherwise return the sum of the actual value + the last two values: let numbers = [1,2,3,4,5,6,7,8,9,10,11,12] let result = numbers.indices.map { index -> Int in guard index > 1 else { return 0 } return numbers[index-2...index].reduce(0,+) } result // [0, 0, 6, 9, 12, 15, 18, 21, 24, 27, 30, 33] or simply let result = numbers.indices.map { $0 < 2 ? 0 : numbers[$0-2...$0].reduce(0,+) }
High
[ 0.7000000000000001, 27.125, 11.625 ]
Elk Point, South Dakota (SD) Chiropractors and surrounding areas Contact our agents right away to grab this premium location and start bringing new patients to your practice. Find Elk Point Chiropractors and Elk Point Chiropractic Clinics Do you need help finding Elk Point chiropractors? Our website is a comprehensive portal that features a way to locate a doctor of chiropractic in Elk Point SD, making it simple to search for Elk Point chiropractors. At 123Chiropractors.com, finding chiropractors in Elk Point SD is as easy as 1-2-3! Entering information about your city, zip code, state, or viewing our online map will connect you to chiropractors in Elk Point SD and their clinics. We will then provide you with phone numbers, addresses, and websites to contact doctors of chiropractic in Elk Point SD. Profiles of Elk Point chiropractors are available through 123Chiropractors.com, where you can compare Elk Point chiropractic treatment options and even make an appointment right on their page. Our Advisory Board made up of Dr. Dan Murphy, Dr. Gerard Clum, Dr. John Donofrio, and Dr. John Brimhall, has allowed 123Chiropractors.com to become the ultimate destination where users can not only discover Elk Point chiropractors, but read current articles about the limitless choices of chiropractic in Elk Point SD. 123Chiropractors.com has rapidly become a premier Elk Point chiropractic directory, offering unique features and benefits to users across the Internet. We focus on 3 Elk Point chiropractors, so that you can research and select the right doctors of chiropractic in Elk Point SD. 123Chiropractors.com has made the process of finding chiropractors in Elk Point SD so simple with our personal profiles, which include a business phone number, description of the Elk Point chiropractic office, hours of operation, and more. The Elk Point chiropractors personal profiles on 123 also feature vital details about our Elk Point chiropractic doctors including a listing of techniques offered, patient testimonials, personal quotes, and videos. Seeking the most professional doctors of chiropractic in Elk Point SD has to offer can happen in an instant, as you compare Elk Point chiropractors, their histories, insurances and method of payments offered, and Internet specials. At 123Chiropractors.com, we realize that finding Elk Point chiropractic care is a complex process, so we have made it our goal to provide the user with the most reliable portal and concise directory. In developing this premier chiropractic portal, we have solidified relationships with chiropractors in Elk Point SD ? and in turn, provide an effective tool for you to choose the best Elk Point chiropractic clinics. At 123Chiropractors.com we give our users a detailed and comprehensive place to locate chiropractors in Elk Point SD with our featured articles, interactive video section, daily blog, and more.
High
[ 0.6625, 39.75, 20.25 ]
/* * Copyright 2006-2009, 2017, 2020 United States Government, as represented by the * Administrator of the National Aeronautics and Space Administration. * All rights reserved. * * The NASA World Wind Java (WWJ) platform is licensed under the Apache License, * Version 2.0 (the "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software distributed * under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR * CONDITIONS OF ANY KIND, either express or implied. See the License for the * specific language governing permissions and limitations under the License. * * NASA World Wind Java (WWJ) also contains the following 3rd party Open Source * software: * * Jackson Parser – Licensed under Apache 2.0 * GDAL – Licensed under MIT * JOGL – Licensed under Berkeley Software Distribution (BSD) * Gluegen – Licensed under Berkeley Software Distribution (BSD) * * A complete listing of 3rd Party software notices and licenses included in * NASA World Wind Java (WWJ) can be found in the WorldWindJava-v2.2 3rd-party * notices and licenses PDF found in code directory. */ package gov.nasa.worldwind.event; import gov.nasa.worldwind.util.Logging; /** * @author tag * @version $Id: RenderingEvent.java 1171 2013-02-11 21:45:02Z dcollins $ */ public class RenderingEvent extends WWEvent { public static final String BEFORE_RENDERING = "gov.nasa.worldwind.RenderingEvent.BeforeRendering"; public static final String BEFORE_BUFFER_SWAP = "gov.nasa.worldwind.RenderingEvent.BeforeBufferSwap"; public static final String AFTER_BUFFER_SWAP = "gov.nasa.worldwind.RenderingEvent.AfterBufferSwap"; private String stage; public RenderingEvent(Object source, String stage) { super(source); this.stage = stage; } public String getStage() { return this.stage != null ? this.stage : "gov.nasa.worldwind.RenderingEvent.UnknownStage"; } @Override public String toString() { return this.getClass().getName() + " " + (this.stage != null ? this.stage : Logging.getMessage("generic.Unknown")); } }
Mid
[ 0.5454545454545451, 34.5, 28.75 ]
// @flow import React from 'react'; import { storiesOf } from '@storybook/react'; import { action } from '@storybook/addon-actions'; import { boolean } from '@storybook/addon-knobs'; import ConnectHardwareWallet from '../../../../source/renderer/app/components/hardware-wallet/settings/ConnectHardwareWallet'; import HardwareWalletsWrapper from '../_utils/HardwareWalletsWrapper'; storiesOf('Wallets|Hardware Wallets', module) .addDecorator(HardwareWalletsWrapper) // ====== Stories ====== .add('Hardware wallet connect Ledger step 1', () => ( <ConnectHardwareWallet onOpenExternalLink={action('onOpenExternalLink')} isLedger={boolean('isLedger', true)} isTrezor={boolean('isTrezor', false)} isDeviceConnected={boolean('isDeviceConnected', false)} fetchingDevice={boolean('fetchingDevice', true)} exportingExtendedPublicKey={boolean('exportingExtendedPublicKey', null)} isExportingPublicKeyAborted={boolean( 'isExportingPublicKeyAborted', false )} /> )) .add('Hardware wallet connect Ledger step 2', () => ( <ConnectHardwareWallet onOpenExternalLink={action('onOpenExternalLink')} isLedger={boolean('isLedger', true)} isTrezor={boolean('isTrezor', false)} isDeviceConnected={boolean('isDeviceConnected', true)} fetchingDevice={boolean('fetchingDevice', false)} exportingExtendedPublicKey={boolean('exportingExtendedPublicKey', true)} isExportingPublicKeyAborted={boolean( 'isExportingPublicKeyAborted', false )} /> )) .add('Hardware wallet connect Ledger step 3', () => ( <ConnectHardwareWallet onOpenExternalLink={action('onOpenExternalLink')} isLedger={boolean('isLedger', true)} isTrezor={boolean('isTrezor', false)} isDeviceConnected={boolean('isDeviceConnected', null)} fetchingDevice={boolean('fetchingDevice', false)} exportingExtendedPublicKey={boolean('exportingExtendedPublicKey', null)} isExportingPublicKeyAborted={boolean( 'isExportingPublicKeyAborted', false )} /> )) .add('Hardware wallet connect Ledger step 4', () => ( <ConnectHardwareWallet onOpenExternalLink={action('onOpenExternalLink')} isLedger={boolean('isLedger', true)} isTrezor={boolean('isTrezor', false)} isDeviceConnected={boolean('isDeviceConnected', true)} fetchingDevice={boolean('fetchingDevice', false)} exportingExtendedPublicKey={boolean('exportingExtendedPublicKey', false)} isExportingPublicKeyAborted={boolean('isExportingPublicKeyAborted', true)} /> )) .add('Hardware wallet connect Trezor step 1', () => ( <ConnectHardwareWallet onOpenExternalLink={action('onOpenExternalLink')} isLedger={boolean('isLedger', false)} isTrezor={boolean('isTrezor', true)} isDeviceConnected={boolean('isDeviceConnected', false)} fetchingDevice={boolean('fetchingDevice', true)} exportingExtendedPublicKey={boolean('exportingExtendedPublicKey', null)} isExportingPublicKeyAborted={boolean( 'isExportingPublicKeyAborted', false )} /> )) .add('Hardware wallet connect Trezor step 2', () => ( <ConnectHardwareWallet onOpenExternalLink={action('onOpenExternalLink')} isLedger={boolean('isLedger', false)} isTrezor={boolean('isTrezor', true)} isDeviceConnected={boolean('isDeviceConnected', true)} fetchingDevice={boolean('fetchingDevice', false)} exportingExtendedPublicKey={boolean('exportingExtendedPublicKey', true)} isExportingPublicKeyAborted={boolean( 'isExportingPublicKeyAborted', false )} /> )) .add('Hardware wallet connect Trezor step 3', () => ( <ConnectHardwareWallet onOpenExternalLink={action('onOpenExternalLink')} isLedger={boolean('isLedger', false)} isTrezor={boolean('isTrezor', true)} isDeviceConnected={boolean('isDeviceConnected', null)} fetchingDevice={boolean('fetchingDevice', false)} exportingExtendedPublicKey={boolean('exportingExtendedPublicKey', null)} isExportingPublicKeyAborted={boolean( 'isExportingPublicKeyAborted', false )} /> )) .add('Hardware wallet connect Trezor step 4', () => ( <ConnectHardwareWallet onOpenExternalLink={action('onOpenExternalLink')} isLedger={boolean('isLedger', false)} isTrezor={boolean('isTrezor', true)} isDeviceConnected={boolean('isDeviceConnected', true)} fetchingDevice={boolean('fetchingDevice', false)} exportingExtendedPublicKey={boolean('exportingExtendedPublicKey', false)} isExportingPublicKeyAborted={boolean('isExportingPublicKeyAborted', true)} /> ));
Mid
[ 0.5394456289978671, 31.625, 27 ]
How to Integrate Labor Disruption into an Economic Impact Evaluation Model for Postdisaster Recovery Periods. Evaluating the economic impacts caused by capital destruction is an effective method for disaster management and prevention, but the magnitude of the economic impact of labor disruption on an economic system remains unclear. This article emphasizes the importance of considering labor disruption when evaluating the economic impact of natural disasters. Based on the principle of disasters and resilience theory, our model integrates nonlinear recovery of labor losses and the demand of labor from outside the disaster area into the dynamic evaluation of the economic impact in the postdisaster recovery period. We exemplify this through a case study: the flood disaster that occurred in Wuhan city, China, on July 6, 2016 (the "7.6 Wuhan flood disaster"). The results indicate that (i) the indirect economic impacts of the "7.6 Wuhan flood disaster" will underestimate 15.12% if we do not consider labor disruption; (ii) the economic impact in secondary industry caused by insufficient labor forces accounts for 42.27% of its total impact, while that in the tertiary industry is 36.29%, which can cause enormous losses if both industries suffer shocks; and (iii) the agricultural sector of Wuhan city experiences an increase in output demand of 0.07% that is created by the introduction of 50,000 short-term laborers from outside the disaster area to meet the postdisaster reconstruction need. These results provide evidence for the important role of labor disruption and prove that it is a nonnegligible component of postdisaster economic recovery and postdisaster reduction.
High
[ 0.672750977835723, 32.25, 15.6875 ]
Q: Dividing 2 SELECT statements - 'SQL command not properly ended' error I'm getting the ORA-00933 error referenced in the subject line for the following statement: select (select count(name) as PLIs from (select a.name, avg(b.list_price) as list_price from crm.prod_int a, crm.price_list_item b where a.row_id = b.product_id and a.x_sales_code_3 <> '999' and a.status_cd not like 'EOL%' and a.status_cd not like 'Not%' and a.x_sap_material_code is not null group by a.name) where list_price = 0) / (select count(name) as PLIs from (select a.name, avg(b.list_price) as list_price from crm.prod_int a, crm.price_list_item b where a.row_id = b.product_id and a.x_sales_code_3 <> '999' and a.status_cd not like 'EOL%' and a.status_cd not like 'Not%' and a.x_sap_material_code is not null group by a.name)) as result from dual; I've tried removing the aliases as suggested solution in other posts but that didn't change the problem. Any ideas? Thanks. A: If you're running this in SQLPlus, it is possible that it misinterprets the division operator in the first column for the statement terminator character. Other tools may also be susceptible. Try moving the division operator, e.g. where list_price = 0) \
High
[ 0.6648648648648641, 30.75, 15.5 ]
NEW YORK (CNNfn) - Online grocer Webvan Group Inc. said Thursday it has canceled its service in Atlanta and is trimming its work force, named a new chief executive, and set a 25-for-1 reverse stock split as part of a corporate-wide restructuring effort to keep the company afloat. Webvan (WBVN: down $0.08 to $0.16, Research, Estimates) said the reverse-split of its shares is intended to keep its flagging stock listed on the Nasdaq. The company reported its cash position fell to $115 million at the end of the first quarter from $212 million at the end of 2000, and it is in preliminary discussions with existing investors for possible debt or equity financing of about $25 million. Webvan also posted a narrower-than-expected first-quarter loss Thursday of 18 cents a share, a penny below Wall Street forecasts of a loss of 19 cents a share, according to earnings tracker First Call. The company, which has about 3,500 employees, said about 485 jobs were affected by the Atlanta closing, the latest shutdown for the troubled company. It also said it is cutting about 400 jobs at its offices in Foster City, Calif., and Kirkland, Wash. Separately, Webvan named Chief Operating Officer Robert Swan as CEO to succeed George Shaheen, who resigned April 13. Webvan said it will continue to deliver in seven markets: Chicago; Los Angeles; San Diego; San Francisco; Seattle; Orange County, Calif.; and Portland, Ore. It shut down operations in Sacramento, Calif., and Dallas earlier this year.
Low
[ 0.47222222222222204, 34, 38 ]
Truck Hits Creek A driver was taken to the hospital after his pickup truck and trailer crashed into the McMichael Creek in Stroudsburg last week. The driver was using a large metal trailer to haul a metal container on south Broad Street before turning around, driving north back toward town, and then hitting a minivan, according to witnesses. The minivan and its driver appeared uninjured, but the pickup veered left on north Broad Street, and down the bank into the cold creek. “The driver had a medical emergency,” said an officer at the scene. An apparent seizure had incapacitated him behind the wheel, according to witnesses. An eyewitness passing by at the right moment climbed down the bank to help the driver out of the partially flooded cab. The driver was conscious and responsive to questions, placed in a neck brace and then loaded into an ambulance that arrived at Lehigh Valley Hospital-Pocono a short time later. The incident shut down Broad Street from the bridge connecting Main to Broad to the exit ramp up the hill mid-afternoon. The police, fire department and a heavy-duty wrecker recovery crew arrived to pull the truck out of the creek. A crowd gathered on the opposite side of the creek to watch the recovery effort and to speculate on what caused the circumstance and the condition of the driver. The recovery crew used a heavy-duty tow truck to drag the pickup from its watery pit. As the wrecker began struggling to move the pickup and its metal trailer, the pickup’s driver side door hung wide open. “The door is still open. Your gonna rip it off!” A group of onlookers yelled from across the creek. The towing stopped. Someone from the recovery crew scampered down the muddy bank and closed the door. Immediate applause followed the effort. More than a dozen people stood to watch the recovery process. Some took photos, others asked if the driver was ok and some did both simultaneously. Eventually the truck and trailer were safely pulled back onto Broad Street and the crowd dispersed.
Low
[ 0.41825902335456405, 24.625, 34.25 ]
Implication of Bcl-2 and Caspase-3 in age-related Purkinje cell death in murine organotypic culture: an in vitro model to study apoptosis. Neuronal cell death is an essential feature of nervous system development and neurodegenerative diseases. Most Purkinje cells in murine cerebellar organotypic culture die when taken from 1-5-day-old mice (P1-P5), whereas they survive when taken before or after these ages. Using DNA gel electrophoresis, terminal deoxynucleotidyl transferase-mediated dUTP nick-end labelling (TUNEL) and electron microscopic analyses, we were able to show that this massive Purkinje cell death is apoptotic in nature and reaches a peak at P3. From the several endogenous genes known to be involved in the apoptotic process, we have focused on two: the bcl-2 and the caspase-3 that encode for anti-apoptotic and pro-apoptotic proteins, respectively. Immunostaining for activated Caspase-3 correlated with Purkinje cell death. A better survival of Purkinje cells was observed in P3 slices taken from hu-bcl-2 transgenic mice, and in slices treated with z-DEVD.fmk (an inhibitor of numerous caspases). Thus, these two genes are implicated in the age-related Purkinje cell apoptosis in organotypic culture. As Purkinje cell death in vitro takes place at the same age as Purkinje cells engaged in intense synaptogenesis and dendritic remodeling in vivo, we propose that this apoptosis reflects a naturally occurring Purkinje cell death during this critical period.
High
[ 0.7091988130563791, 29.875, 12.25 ]
package WiRLDesign; {$R *.res} {$IFDEF IMPLICITBUILDING This IFDEF should not be used by users} {$ALIGN 8} {$ASSERTIONS ON} {$BOOLEVAL OFF} {$DEBUGINFO OFF} {$EXTENDEDSYNTAX ON} {$IMPORTEDDATA ON} {$IOCHECKS ON} {$LOCALSYMBOLS ON} {$LONGSTRINGS ON} {$OPENSTRINGS ON} {$OPTIMIZATION OFF} {$OVERFLOWCHECKS OFF} {$RANGECHECKS OFF} {$REFERENCEINFO ON} {$SAFEDIVIDE OFF} {$STACKFRAMES ON} {$TYPEDADDRESS OFF} {$VARSTRINGCHECKS ON} {$WRITEABLECONST OFF} {$MINENUMSIZE 1} {$IMAGEBASE $400000} {$DEFINE DEBUG} {$ENDIF IMPLICITBUILDING} {$DESCRIPTION 'WiRL REST components'} {$LIBSUFFIX '240'} {$DESIGNONLY} {$IMPLICITBUILD OFF} requires rtl, WiRLRunTime, DesignIDE; contains WiRL.Client.Register in '..\..\Source\Client\WiRL.Client.Register.pas', WiRL.http.Client.Editor in '..\..\Source\Client\WiRL.http.Client.Editor.pas', WiRL.http.Server.Editor in '..\..\Source\Core\WiRL.http.Server.Editor.pas', WiRL.Core.Register in '..\..\Source\Core\WiRL.Core.Register.pas', WiRL.Data.FireDAC.Editor in '..\..\Source\Data\FireDAC\WiRL.Data.FireDAC.Editor.pas', WiRL.Client.CustomResource.Editor in '..\..\Source\Client\WiRL.Client.CustomResource.Editor.pas', WiRL.Core.Application.Editor in '..\..\Source\Core\WiRL.Core.Application.Editor.pas' {WiRLAppEditor}; end.
High
[ 0.675392670157068, 32.25, 15.5 ]
using Microsoft.VisualStudio.Language.Intellisense; using System; namespace Microsoft.VisualStudio.Editor.PeekF1 { internal class F1PeekResultScrollState : IPeekResultScrollState { private F1PeekResultPresentation _presentation; public F1PeekResultScrollState(F1PeekResultPresentation presentation) { if (presentation == null) { throw new ArgumentNullException("presentation"); } _presentation = presentation; } public Uri BrowserUrl { get { if (_presentation.Browser != null) { return _presentation.Browser.Url; } return null; } } public void RestoreScrollState(IPeekResultPresentation presentation) { } public void Dispose() { } } }
Mid
[ 0.574418604651162, 30.875, 22.875 ]
Q: How can I solve the ODE: $x^2y''+5xy'+4y=\dfrac{1}{x}$? I'm given the ordinary differential equation $$x^2y''+5xy'+4y=\frac{1}{x},$$ which I'm trying to solve using variation of parameters. Now, if I know the auxiliary equation, I know the complementary function, so I can find the particular integral. So, my question is: How do I find the auxiliary equation? If the coefficients were constant, I'd be fine with this. I know I could divide through by $x^2$ to give $$y''+\frac{1}{x}+\frac{4}{x^2}y=\frac{1}{x^3}$$ but where do I go from here? Thanks A: This is an inhomogeneous Euler equation. At first we need to carry out the transformation $$ y(x)=z(\log x), $$ which turns the equation into an equation of constant coefficients. In particular, $$ y'(x)=z'(\log x)\frac{1}{x}, \quad y''(x)=z''(\log x)\frac{1}{x^2}-z'(\log x)\frac{1}{x^2} $$ and hence $$ xy'=z', \quad x^2y''=z''-z'. $$ So $$ \frac{1}{x}=xy''+5xy'+4x =z''-z'+5z'+4z=z''(\log x)+4z'(\log x)+z(\log x), $$ and thus $$ z''(x)+4z'(x)+4z(x)=\mathrm{e}^{-x}. \tag{1} $$ The general solution of $z''(x)+4z'(x)+4z(x)=0$ is $z(x)=\mathrm{e}^{-2x}(c_1x+c_2)$, whereas $w(x)=\mathrm{e}^{-x}$ is a special solution of $(1)$. Thus the general solution of $(1)$ is $$ z(x)=\mathrm{e}^{-2x}(c_1x+c_2)+\mathrm{e}^{-x}, $$ and finally $$ y(x)=z(\log x)=\frac{1}{x^2}(c_1\log x+c_2)+\frac{1}{x}. $$ Note that the solution is defined either in $\mathbb R_+$ or $\mathbb R_-$.
High
[ 0.697508896797153, 36.75, 15.9375 ]
Contents Ilya I. Ilyin and Arkadi D. Ursul Evolutionary Approach to Global Research and Education: Theoretical and Methodological Issues Original text and References The article presents an evolutionary approach to Globalistics which will study global processes and systems, primarily, globalization and global problems as regards to their development and relation to and individual and society. The main subject of Evolutionary Globalistics is global development as an evolution of global processes and systems. The concept of Evolutionary Globalistics is considered within the context of the universal (global) evolutionism and possible transition to the sustainable development, and also formation of various stages of noosphere. Education is likely to undergo transformations caused by the evolutionary changes of the whole civilization and interaction between society and nature. There will appear an evolutionary range of global models of education processes and systems, starting from the currently existing experimental options of global education, then education for the global process of sustainable development, and also formation of both noospheric education, and ‘global and evolutionary’ forms of education. The present article discusses some general issues connected with the definition of Global Studies, its subject, status, terminology, main directions and problems of this field. The author's position concerning a number of fundamental issues is formulated, namely: what is Global Studies; whether this branch is a science; what is its status; what place Global Studies hold in the system of modern sciences; whether Global Studies belong to political sciences, sciences about the international relations or to philosophical disciplines. The main issue of this article concerns the following issue: how the religion in recent years has become the major subject of the world politics and international relations, not least because the religion has appeared in the center of some dangerous world global conflicts. It is proved that modern global history which developed in the context of disputable discussion on globalization gives us the chance to understand on the one hand how the subject of religion has been ignored in the world politics studies, and on the other how while studying religion in particular its sociological form the international relations have also been neglected in view of its constant and inappropriate concern of secularization. So both parts of the equation ignore each other in many respects. It is characteristic for the structure of academic disciplines, in particular in the Western world. Various directions of human activity have become more closely connected in the modern global world. It is well shown by the recent world crisis which having started in the financial and economic spheres spread to social, political and other spheres of public life very quickly, having affected not only material, but also spiritual foundations of public life: culture, science, education. To promote a better understanding of complex nature of the problems of this subject the editorial board of the journal ‘Age of Globalization’ appealed to competent experts to express their opinion on this point. This paper will focus on the basic social contradiction, due to the deep, often overlooked conflict between capitalism, the main motor of the main part of the world, which can be represented as a so-called economic blockhead and an influential form of Islam, which I will call ‘Islamic fundamentalism’ applying the Protestant term of ‘religious fundamentalism’. I believe that this contradiction, which results from unfettered expansion of increasingly globalized economic capitalism, lies at the root of the 9/11 events. Migration has always been the most important component of economic development and social progress in many countries. Labor migration becomes one of the major resources of the regional integration where regulation of labor migration is conducted at the region-wide level since only such large integration unions using advantages of merger of the markets, resource bases and labor potentials can withstand in the conditions of the growing competition of the globalized world. However, if migration is not regulated by the adequate laws and rules, it poses a danger to human rights violation of people participating in it and social tension. Today discussion about migration represents a contradiction between economic logic of globalization, on the one hand, and the moral values presented by the concept of human rights, on the other. There are often diametrically opposed views on the problems of protecting rights of the migrants in view of these disagreements, especially of those who have no legal status, and insurance of safety and social stability if foreign citizens are under protection of the national legislation. In the reality of daily life this contradiction focuses on the problem of migration as a dominant theme of discussion about the relationship of labor and capital, the distribution of income from economic activity, about the regulation of working conditions and life and how foreign workers and civil society can self-organize to formulate and protect the rights clearly. The article represents the critical analysis of the concept of ‘political globalization’ used by geopolitical hegemon to remove the principles of national sovereignty, national interests, balance of forces, and also the category ‘expansion’. A peculiar role of the state as the main subject of international relations and a guarantor of the world system variety is proved, and also a role of the state line as a measure of real sovereignty in the conditions of the crisis of the Westphalian system created by information and economic globalization. Some aspects of the general-purpose bases of making border policy of the state during the post-Westphalian era are considered. The scientific validity of the ideological foundations of globalization is considered in the article as the prime condition of development of globalization in the direction of formation of the dynamic global system. The article explores reasons of the crisis observed in three subsystems nowadays: political, legal and economic. The author introduces the thesis that the main problem consists in the system of norms and basic values of global system. Basic principles of the corresponding activity in solution of the problem are also discussed. The outstanding Russian thinker, philosopher, literary scholar, publicist, and politician Yury Fedorovich Karyakin marks the 80th anniversary. To this remarkable date we publish the philosopher's article written in the last century, but which has not lost its significance nowadays. The attention is paid to human rights as to a possible consensus between cultures within the intellectual dialogue in this article. The author seeks to contribute to intellectual overcoming of clash of civilizations and searches for the ways to overcome imposing of human rights on other cultures. It is shown that the method of the cross-cultural affirming of human rights without particular aspects of separate cultures and civilizations causes the resistance to humiliation and abuse among people. The first part of the article is devoted to a short review of the range of problems of the discussion and dialogue, the second one deals with cross-cultural and intercivilization nature of this discussion, in the third one human rights are considered on the basis of the above-mentioned facts, and the last, final part concerns legal documents on human rights. The ideas of united Europe emerged long ago, at the beginning of the 16thcentury. Later many outstanding thinkers, scientists, philosophers, politicians, and writers developed them in various directions. In real practice Europe has never been united either ethnically, or politically. The formation of a common European educational space assumes not unification, but coordination, mutual enrichment of national education systems and educational cultures with preservation of the national identity and civilization distinctions. The role of Russia in this process is very significant. Being the largest Eurasian country Russia has significant geopolitical and geo-economic advantages and objectively should develop a multi-vector foreign policy. In the article the author analyzes modern Russian policy in the Caucasus. It is shown that today Islamic terrorist organizations are the main political force fighting against Russia. They use different resources: staffing, financial, ideological and political. The youth of the Caucasian Muslim republics is the main social group which is of interest for the terrorist networks in terms of staffing. Islamism has its own ideology distinguishing it from separatism with different functioning mechanisms, regions of distribution, participants and sympathizing. Policy had also to be changed respectively. During a pause in the Caucasian policy the enemy represented by radical Islamism managed to become stronger organizationally, financially and ideologically, and also began a new round of the armed stand-off with Russia. Now, when the novelty of the problem became clearer, qualitatively new Russian policy is rapidly formed in the Caucasus. The article is devoted to the problem which explodes the myth about identity of Russia and the Soviet Union through social and philosophical analysis of formation and development of Russia, through its dialectics of objective conditions and subjective factor. The abolishment of this myth can be the first step on the way of establishment of good neighborly relations between Europe, Asia and Russia. Today we can observe the signs of weakening of ‘the third wave’ of democracy, and the beginning of the process of its throwback. We can see this democratic backsliding not only in Russia, but also in other countries of the world. This article is devoted to generalization of the collected facts and the analysis of the reasons of backsliding of ‘the third wave’ of democracy. Using materialistic methodology the author shows that the crash of totalitarian systems known in history as socialism was connected with their economic crisis. The considerable part of authoritarian regimes of the world is based upon the armed forces. Refusal of further development of democracy in a number of countries is caused not only by economic strengthening of bureaucracy. In many countries freedom brought instability, separatism and distribution of terrorism. The author associates progress towards democracy with processes of liberalization of economy, and draws a conclusion that authoritarianism is based on the state paternalism and accompanying poverty. It can be defeated only by means of policy of social liberalism providing involvement of the most part of population in labor and business activity and supporting that part of population which cannot carry out these functions.
High
[ 0.6692913385826771, 31.875, 15.75 ]
Cortisol excretion in essential hypertension. A number of factors suggest that abnormalities of the adrenal cortex are present in essential hypertension. To determine whether altered cortisol excretion exists in essential hypertension, we have measured urinary free cortisol and cortisol to creatinine ratios in early morning urine specimens for 14 consecutive days. We have established a reference range for these parameters in 26 normotensive subjects. We have also compared these values in nine normotensive subjects and nine patients with essential hypertension closely matched for age, sex and body mass index. In the 26 normotensive subjects, urinary free cortisol was 240 +/- 13 nmol/l (mean +/- s.e.m) and cortisol to creatinine ratio was 22 +/- l. In the nine hypertensive subjects, urinary free cortisol was 238 +/- 48 nmol/l and cortisol to creatinine ratio was 20 +/- 3. We have not demonstrated an abnormality of cortisol excretion in essential hypertension.
Mid
[ 0.585185185185185, 29.625, 21 ]
Q: Python iterating over a list in parallel? I have a list created with no more than 8 items in it, right now I loop over the item with a standard for loop "for item in list:" I am wondering if there is a way to check all of the elements at the exact same time? I have seen some posts about using zip to iterate over 2 lists at the same time which could help. If there is no way to iterate over a lists elements at the same time I would guess I need to split one single list into 4 separate lists and iterate 2 at the same time using zip and do the other 2 on a separate thread, that seems like it could be a clunky fix though. Any help would be appreciated. Edit Sorry to be vague, I have a list apples = ['green', 'green', 'green', 'red'] right now I use a for loop to go over each element, for apple in apples: checkAppleColour(apple) #Do some more stuff depending on colour.... right now it loops over each element in apple one by one, what I would like to be able to do is check each of the items at the exact same time for a colour check as every millisecond counts (example code used, but principle is exactly the same for what I am trying to achieve). Performance is key here I don't mind if its threading I have to use, but I need maximum speed / efficiency for checking each element and my guess is parallelism is the way to do it, I am just not quite sure how. A: If you can map a function onto the list, parallelism is easy. def addOne (x): return x + 1 The default map does things on one thread. map(addOne, range(1, 4)) #When iterated over produces [2, 3, 4] If your problem is a map, it means that it's trivially parallel. from multiprocessing import Pool pool = Pool() pool.map(addOne, range(1, 4)) ##When iterated over produces [2, 3, 4] This uses multiple processes. multiprocessing.dummy.Pool is a thread pool. See this article for a great introduction to the rationale behind both.
High
[ 0.65721649484536, 31.875, 16.625 ]
// // Generated by class-dump 3.5 (64 bit) (Debug version compiled Oct 15 2018 10:31:50). // // class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2015 by Steve Nygard. // #import <LoginUIKit/LUIController.h> @class LUITextField; @interface LUIInfoStatusController : LUIController { LUITextField *_infoTextField; } + (id)controllerWithStyle:(int)arg1; - (void)dealloc; - (id)initWithStyle:(int)arg1; - (void)setInfo:(id)arg1; - (void)_setupContentView; @end
Low
[ 0.48780487804878003, 27.5, 28.875 ]
1. Field of the Invention The present invention relates generally to targets and more specifically it relates to a moving target system for efficiently improving the accuracy of a shooter. 2. Description of the Related Art Any discussion of the related art throughout the specification should in no way be considered as an admission that such related art is widely known or forms part of common general knowledge in the field. Targets have been in use for years and are utilized by various types of sportsman to improve their accuracy, shooting skills or simply for the enjoyment of the sport. Targets generally come in various shapes and sizes to adapt to the particular purpose that the shooter is utilizing the target for. One of the main problems with targets is that the target is generally stationary. A stationary target may not challenge the shooter properly or prepare the shooter for real life situations, wherein if the shooter is a practicing for hunting sake it may be a great advantage to practice on a moving target. Because of the inherent problems with the related art, there is a need for a new and improved moving target system for efficiently improving the accuracy of a shooter.
Mid
[ 0.543689320388349, 35, 29.375 ]
Q: Movie where man alerts police because wife is missing, but has killed her himself I'd like to identify a movie (possibly made for TV, but in full movie length) I watched on TV in the late 80s or early 90s. The action takes place in winter in a small town in northwestern USA or Canada. An man reports his wife missing to the police. (I think they were in town for holiday, or rented a house for the winter). He suspects a crime, seems very worried, and gets angry at the police as the investigation does not seem to go anywhere, or they do not seem to take the matter seriously. He remains the point-of-view character during the whole movie. At the end the surprise reveal is that he himself killed his wife and hid the body, and the police actually suspected him all along and only played dumb. I also remember that the movie was based on a theatre play. A: Sounds something like Vanishing Act (1986) In the Rocky Mountains, Harry Kenyon seeks out his missing wife Chris in the Winter Parade. Harry meets Lieutenant Rudameyer and tells that him he is from San Francisco and has just married Chris, from Philadelphia, in Las Vegas. They traveled to the Rockies on honeymoon and they had an argument the previous day, and Chris left their isolated cabin in her car. Harry also says that he is worried about her disappearance since she is not a good driver. Harry returns to his cabin and receives a phone call from the local priest, Father Macklin, who summons him to go to the church. Father Macklin tells says Chris is in the church waiting for him. When Harry sees Chris, he tells that she is not his wife; but the woman knows details of their lives and Harry is discredited by the evidences. Is a stranger impersonating Chris or is Harry delusional?
Mid
[ 0.5877192982456141, 33.5, 23.5 ]
Sailing Pilgrim Sailing Pilgrim wants to focus on a little known part of Norwegian history. In 2015 a Pilgrims road from Valldal to Nidaros, via Dombås, was opened. This got its approval because of the fact that St Olav in January 1029 travelled through Valldal. He left many traces which can be seen even today. Sailing Pilgrim will take pilgrims and others out on the fjord in a Viking ship and tell the story about St Olav`s dramatic escape on the fjord and up the valley, before he moved via Dovre over to Sweden. We can offer a unique voyage on the fjord with spectacular nature. At the same time it is a journey 1000 years back in time. People will see the Sylte serpent, the money cave, the pulpit, the snuff horn and the oar-blade, which all have stories about Olav linked to them. On shore they will see Olav`s monument, Olav`s road, Olav`s spring and Olav`s flagstone. Many will say that aside from Stiklestad, Valldal is the place that owns the most traditions linked to St Olav.
High
[ 0.658227848101265, 32.5, 16.875 ]
The present invention relates to a method for solidifying radioactive wastes, and more particularly to a method for improving the long-term storage characteristics of solidified radioactive wastes comprising compact blocks which are to be disposed in transporting or final storage containers. The compact blocks comprise prefabricated ceramic tablets containing radioactive substances and an inactive matrix which continuously surrounds these tablets and is solid in its final state. Radioactive wastes must be conditioned for permanent storage, i.e. they must be converted with the aid of matrix materials into solidified products. Such solidified products must have a high resistance to leaching of the radioactive substances by aqueous solutions. For waste concentrates containing medium and highly radioactive wastes and/or actinides, or for fine-grained solid wastes which are present as suspensions in water or acids or for muds, ceramic matrix materials have been used, among others, to form the solidified products. The radioactive wastes are mixed with these matrix materials, are shaped and sintered to form mechanically stable bodies. For reasons of workability of such ceramic materials, the tablet shape has been selected for the ceramic solidification products. In principle, radioactive wastes that have been conditioned in this manner can be stored in suitable containers in a permanent storage facility. There do exist, however, some considerable drawbacks with the tablet shaped solidification products. Thus, if the transporting or final storage container is damaged, the tablets may be scattered about. The danger of contamination is then augmented considerably. Moreover, the bulk of such tablets constitutes a very large surface area. In the case of the entry of liquids, for example, water or aqueous salt solutions, the leachings of radioactive substances per unit time is relatively high. Further, heat dissipation from the bulk tablet fill is limited. These drawbacks can be overcome if bulk fills of ceramic tablets, whose individual volume is in the milliliter range, are solidified with the aid of a filler or binder into compact and mechanically stable blocks. The volume of these blocks is the liter range. Such fillers or binders will hereinafter be called the continuous matrix. DE-PS No. 2,726,087 and corresponding U.S. Pat. No. 4,297,304 disclose a method for solidifying such radioactive wastes. In particular, these documents disclose a method for solidifying high and medium radioactivity and/or actinide containing aqueous waste concentrates or fine-grained solid wastes suspended in water for final noncontaminating storage in which the waste concentrates or the suspensions are subjected together with absorbing and/or hydraulically binding inorganic material, to a ceramic firing process so as to produce a solid sintered body. The method comprises a plurality of steps, including (a) treating the waste concentrates or suspensions by evaporation, to form an evaporate having a water content in the range between 40 and 80 percent by weight and a solid content whose metal ion and/or metal oxide concentration lies between 10 and 30 percent by weight of the evaporate being formed, and adjusting the pH of the evaporate to between 5 and 10; (b) kneading the evaporate obtained from step (a) with a clay-like substance containing a small quantity of cement, or with such a clay-like substance or mixture of a clay-like substance with a small quantity of cement containing an additive for suppressing the volatility of alkali metals or alkaline earth metals which may be present in the evaporate and/or an additive for suppressing the volatility of any decomposable anions which may be present in the evaporate selected from sulfate, phosphate, molybdate and uranate ions, at a weight ratio range of evaporate to clay-like substance of 1:1 to 2:1, the clay-like substance being at least one substance selected from pottery clays, stoneware clays, porcelain clay mixtures and kaolin; (c) producing molded bodies from the kneaded mass obtained in step (b); (d) heat treating the molded bodies, including drying at temperatures between room temperature and 150.degree. C., calcining at temperatures up to 800.degree. C., and subsequently firing at temperatures between 800.degree. and 1400.degree. C. to form practically undissolved mineral phases; and (e) enclosing the molded bodies containing the fired mineral phases on all sides in a dense, continuous ceramic or metallic matrix. The molded bodies of step (d) can be comminuted to a grain size range of about 1 to 10 mm, and thus be in the form of small particles or chips before being enclosed in the matrix of step (e). The continuous matrix can be a fired ceramic produced from at least one clay substance and at least one cement. It has been found, however, that if a continuous ceramic matrix is used produced from at least one clay-like substance, e.g. from the group including pottery clays, porcelain clay mixtures or kaolin, and cement, and particularly if this mass has been processed into a fired ceramic, the solidified product does not have the desired properties. No clay-like material, with or without the addition of cement, has been found thus far for use as a continuous matrix which, in its sintered state, has a coefficient of thermal expansion which is at least very similar to that of the ceramic tablets and which shrinks uniformly and tightly onto the ceramic tablets during firing so that in the past solidified blocks were obtained which were penetrated by extensive cracks. The cracks permitted the access of liquids into the interior. Moreover, the mechanical stability of such blocks was limited. These drawbacks could also not always be overcome by the use of a hot pressing technique. In contrast to mixtures of particulate bodies which can be optimally compressed and sintered, there are limited possibilities for compressing mixtures of sinterable, clay-like or ceramic powders. The compression limit is reached when the ceramic tablets contact one another and support themselves on one another. Beginning with this state, the pressure no longer acts on the ceramic powder disposed in the interstices. Sintering then takes place practically without pressure, i.e. compression occurs only by the shrinkage caused by the sintering process. Thus, the same or similar results can be expected as in the above-mentioned process of DE-PS No. 2726087 and U.S. Pat. No. 4,297,304 which is a pressure-free sintering process. If it is attempted to effect compression beyond the stated limits, this unavoidably results in destruction of the ceramic tablets. At the customary sintering temperatures, the ceramic matrix material does not flow so plastically that it is able to cover the resulting fragments on all sides, and accordingly the pressure surfaces remain practically open. One advantage of embedding the ceramic tablets in a matrix, namely the reduction of the surface area accessible to leaching when the transporting or permanent storage container is damaged, is thus eliminated. A more extensive compression than described above without the danger of destruction of the ceramic tablets can be realized if it is assured, by a high mixing ratio of ceramic powder to ceramic tablet, that in the compressed state there will always be matrix material between the ceramic tablets. Independently of whether this state can be realized with sufficient reliability under conditions applicable to working with highly radioactive substances, there exists the drawback that the volume of the container holding the block with the solidified tablets cannot be utilized optimally with respect to the tablets, since the matrix material enforces a certain "spacing" of the tablets. This drawback is connected with the fact that unavoidably expensive permanent storage volume must be occupied with inactive substances.
Low
[ 0.519736842105263, 29.625, 27.375 ]
table interact "Interaction between two regions" ( string chrom; "Chromosome (or contig, scaffold, etc.). For interchromosomal, use 2 records" uint chromStart; "Start position of lower region. For interchromosomal, set to chromStart of this region" uint chromEnd; "End position of upper region. For interchromosomal, set to chromEnd of this region" string name; "Name of item, for display. Usually 'sourceName/targetName' or empty" uint score; "Score from 0-1000." double value; "Strength of interaction or other data value. Typically basis for score" string exp; "Experiment name (metadata for filtering). Use . if not applicable" string color; "Item color. Specified as r,g,b or hexadecimal #RRGGBB or html color name, as in //www.w3.org/TR/css3-color/#html4." string sourceChrom; "Chromosome of source region (directional) or lower region. For non-directional interchromosomal, chrom of this region." uint sourceStart; "Start position source/lower/this region" uint sourceEnd; "End position in chromosome of source/lower/this region" string sourceName; "Identifier of source/lower/this region" string sourceStrand; "Orientation of source/lower/this region: + or -. Use . if not applicable" string targetChrom; "Chromosome of target region (directional) or upper region. For non-directional interchromosomal, chrom of other region" uint targetStart; "Start position in chromosome of target/upper/this region" uint targetEnd; "End position in chromosome of target/upper/this region" string targetName; "Identifier of target/upper/this region" string targetStrand; "Orientation of target/upper/this region: + or -. Use . if not applicable" )
Mid
[ 0.5862884160756501, 31, 21.875 ]
--- abstract: 'Recent advances in deep reinforcement learning (RL) have demonstrated its potential to learn complex robotic manipulation tasks. However, RL still requires the robot to collect a large amount of real-world experience. To address this problem, recent works have proposed learning from expert demonstrations (LfD), particularly via inverse reinforcement learning (IRL), given its ability to achieve robust performance with only a small number of expert demonstrations. Nevertheless, deploying IRL on real robots is still challenging due to the large number of *robot* experiences it requires. This paper aims to address this scalability challenge with a robust, sample-efficient, and general meta-IRL algorithm, SQUIRL, that performs a new but related long-horizon task robustly given only a single video demonstration. First, this algorithm bootstraps the learning of a task encoder and a task-conditioned policy using behavioral cloning (BC). It then collects real-robot experiences and bypasses reward learning by *directly* recovering a Q-function from the combined robot and expert trajectories. Next, this algorithm uses the Q-function to re-evaluate all cumulative experiences collected by the robot to improve the policy quickly. In the end, the policy performs more robustly (90%+ success) than BC on new tasks while requiring no trial-and-errors at test time. Finally, our real-robot and simulated experiments demonstrate our algorithm’s generality across different state spaces, action spaces, and vision-based manipulation tasks, e.g., pick-pour-place and pick-carry-drop.' author: - 'Bohan Wu, Feng Xu, Zhanpeng He, Abhi Gupta, and Peter K. Allen [^1]' bibliography: - 'IEEEabrv.bib' title: '**SQUIRL: Robust and Efficient Learning from Video Demonstration of Long-Horizon Robotic Manipulation Tasks**' --- Introduction ============ We aspire robots to become generalists who acquire new complex skills robustly and quickly. The robotic system, whether planned or learned, needs to leverage its existing knowledge to solve a new but related task in an efficient yet high-performance manner. Thanks to recent advances in machine learning and sim-to-real transfer mechanisms, short-horizon robotic manipulation such as grasping has improved in performance. However, many real-world robotic manipulation tasks are long-horizon, diverse, and abundant in volume. In the absence of a scalable and systematic way to construct simulation environments for a large number of tasks, the robot needs to learn a new task directly in the physical world from only a handful of trials, due to the high cost of collecting real-robot trial-and-errors and experiences. ![**Learning from a single video demonstration of a long-horizon manipulation task via Soft Q-functioned Meta-IRL (SQUIRL).** In the pick-pour-place example above, the robot needs to approach, pick-up and carry the grey bottle, pour the iron pebble inside the bottle into a specific container, and finally place the bottle back on the table. During training, the robot is given a single video demonstration for *each* of the 117 training tasks. After learning from these 117 videos, the robot also practices 90 trial-and-errors *in total* on these tasks. From such combined expert and robot trajectories, the robot learns the general skills of pouring robustly. At test time, given a single video demonstration of pouring into a *new, unseen* red container at a *new* position, the robot successfully replicates this new task without the need for any trial-and-errors.[]{data-label="fig:intro"}](figures/intro.png){width="1\linewidth"} We observe that real-world robotic skill acquisition can become more sample-efficient in several important ways. First, we notice that humans learn tasks quickly by watching others perform similar tasks. Among many forms of task representations such as rewards, goal images, and language instructions, human demonstrations guide exploration effectively and can lead to significant sample efficiency gains. Furthermore, learning from video demonstrations sidesteps hand-designing a proper reward function for every new task. In the case of a vision-based task, video demonstrations also conveniently provide the same pixel state space for the robot. In learning from demonstrations (LfD), the robot should be sample-efficient in two dimensions – it should use as few expert demonstrations (“demonstrations” hereafter) as possible and take as few trial-and-errors (practices) as possible on its own to learn a robust policy. Among LfD methods, behavioral cloning (“BC” hereafter) is sample-efficient but susceptible to compounding errors. Here, compounding errors refer to the problem in which every time a behavioral-cloned robot makes a small error, it makes a larger error down the road as it drifts away from the expert state distribution. In contrast, IRL alleviates compounding errors by allowing the robot to try the tasks out in the real world and measure its behavior against the expert. However, due to the need to learn a reward function, IRL can require many trial-and-errors in the real world, while BC does not require such robot experiences. We posit that leveraging off-policy experiences of trial-and-errors is essential to making IRL sample-efficient enough for real robots. Here, “off-policy experiences” refer to the *cumulative* experiences that the *robot* has collected thus far during *training*. In contrast, “on-policy experiences” are the most recent experiences that the robot has collected using its *current* policy. Humans leverage lifelong, cumulative experiences to learn quickly at present. We envision robots to acquire new skills more quickly by learning from off-policy (i.e., cumulative) experiences. Finally, many real-world tasks are related and share structures and knowledge that can be exploited to solve a new but similar task later. For example, humans can quickly learn to pick and place a new object after learning to pick and place many known objects. Meta-learning, explicitly utilizing this property, aims to learn a new but related task quickly if it has already learned several similar tasks in the past. With these motivations, we introduce SQUIRL, a meta-IRL algorithm that learns long-horizon tasks quickly and robustly by learning from 1) video demonstrations, 2) off-policy robot experiences, and 3) a set of related tasks. Fig.\[fig:intro\] explains this algorithm using the example of a set of long-horizon pick-pour-place tasks, using the UR5-Seed[^2] robot setup shown in Fig.\[fig:hardware\]. In this task, we have the containers (green, yellow, orange, and red), a cylindrical bottle (grey), and an iron pebble inside the bottle. The robot needs to *first approach* and pick-up the grey bottle, pour the iron pebble inside the bottle into a specific container on the table, and then finally place the bottle back on the table, as shown in each row of images in Fig.\[fig:intro\]. At the beginning of each task, the bottle is *not yet* in hand, but the iron pebble is already in the bottle. At training time, the robot is given a single video demonstration for each of the 117 pick-pour-place tasks, as shown in the first two rows of images in Fig.\[fig:intro\]. Every new combination of container positions represents a different pick-pour-place task. Furthermore, the robot only needs to pour into *one* of the containers in a single task. Therefore, pouring into different containers also represents different tasks. After learning from these 117 demonstrations, the robot also practices 90 trial-and-errors on these tasks *in total*. From such a combination of expert and robot trajectories, the robot learns the general skills of pick-pour-place robustly. In all 117 training tasks, only *two* of the four containers appear on the table: the green and yellow containers, as shown in the first two rows of images in Fig.\[fig:intro\]. The orange and red containers are excluded during training and only appear at test time, as shown in the last row of images in Fig.\[fig:intro\]. We do so to evaluate our algorithm’s generalizability to unseen containers *at test time*. As shown in the last row of images in Fig.\[fig:intro\], the robot successfully pours into a *new* container (red) at test time, at a *new* position never seen before during training, without the need for any trials or practices. To achieve such fast generalization to new tasks, our algorithm learns a task encoder network and a task-conditioned policy. The task encoder generates a 32-dimensional task embedding vector that encodes task-specific information. The policy network then learns to generalize to new tasks by accepting this task embedding vector as input, thus becoming “task-conditioned”. During training, our algorithm first bootstraps learning by training both the task encoder and the policy jointly via the BC loss. The robot then collects 10 trials across 10 tasks using the warmed-up policy and the task encoder. Next, using the combined experiences of the expert and the robot, our algorithm bypasses reward learning by directly learning a task-conditioned Q-function. Using this Q-function, our algorithm then reuses and re-evaluates all cumulative experiences of the robot to improve the policy quickly. This cycle repeats until the $90^{th}$ trial. Finally, at test time, the task encoder generates a new task embedding from a *single* video demonstration of a new task. This embedding is then inputted into the task-conditioned policy to solve the new task without any trial-and-errors and yet in a high-performance manner. In summary, our contributions are: 1. A *robust* meta-IRL algorithm that outperforms ($90\%$+ success) its behavioral cloning counterpart in real-robot and simulated vision-based long-horizon manipulation; 2. A *novel* Q-functioned IRL formulation that circumvents reward learning and improves IRL sample efficiency; 3. An *efficient* method that leverages off-policy robot experiences for training and requires no trials at test time; 4. A *general* approach that tackles various long-horizon robotic manipulation tasks and works with both vision and non-vision observations and different action spaces. Related Work ============ Inverse Reinforcement Learning (IRL) and Meta-IRL ------------------------------------------------- Inverse reinforcement learning (IRL) models another agent’s (typically the expert’s) reward function, given its policy or observed behavior. Previous works have approached the IRL problem with maximum margin methods [@abbeel2004irl][@ratliff2006mmp] and maximum entropy methods [@ziebart2010entropyirl][@ziebart2008maximum][@boularias11a2011entropyirl]. In particular, maximum entropy methods recover a distribution of trajectories that have maximum entropy among all distributions and match the demonstrated policy’s behaviors. While these methods have shown promising results in continuous control problems, they suffer from low sample efficiency due to the need for evaluating the robot’s policy, which can be alleviated by meta-learning (i.e., meta-IRL). SMILe [@smile] and PEMIRL [@yu2019meta] are two meta-IRL algorithms based on AIRL [@fu2018learning] that leverage a distribution of tasks to learn a continuous task-embedding space to encode task information and achieve fast adaptation to a new but similar task. Our work differs from [@smile][@yu2019meta] in four crucial ways. First, our meta-IRL algorithm works with real robots and image observations. Second, instead of a reward function, we directly model a Q-function that the policy can optimize, in order to increase IRL sample efficiency. Third, we train the task encoder with the behavioral cloning (BC) gradient as opposed to the IRL gradient for stabler and more efficient learning. Lastly, we bootstrap policy and task encoder learning using BC before training via meta-IRL. Real-robot Learning from Demonstrations (LfD) --------------------------------------------- Our work is related to real-robot LfD [@argall-survey-robot-learning-2009], such as [@xu2018neural][@huang2019neural][@huang2019motion]. In particular, [@finn2016guided] developed IRL on real robots without learning from raw pixels. Other works (e.g., [@zhang2017imitationmanipulation][@Kober2010RAM][@paster2009motorskills][@sermanet2018time]) used BC for real-robot LfD. Another work [@lynch2019latentplan] developed goal-conditioned BC on a simulated robot to learn long-horizon tasks by playing with objects in the scene. While enjoying efficient learning by casting imitation learning into a supervised learning problem, BC suffers from the covariate shift between the train and test data. In comparison, IRL achieves robust performance by modeling the state-action joint distribution instead of the conditional action distribution in BC [@divergence2019]. Different from previous works, our meta-IRL algorithm works on real-robot *vision-based* tasks, and its Q-functioned IRL policy gradient can be directly combined with the BC gradient signal to approach both the sample efficiency of BC and the robustness of IRL. One-shot Meta-imitation Learning on Real Robots ----------------------------------------------- Our algorithm attempts to enable robots to quickly and robustly imitate a single unseen video demonstration by learning from a distribution of tasks with shared structure, i.e., one-shot robot meta-imitation learning. For example, [@finn2017one] combines gradient-based meta-learning and BC on a real robot to learn quickly from video demonstrations. [@yu2018one] then extends [@finn2017one] to enable robots to learn from human-arm demonstrations directly. [@yu2019one] then improves [@yu2018one] to meta-imitation-learn multi-stage real-robot visuomotor tasks in a hierarchical manner. However, constrained by the covariate shift problem of BC, these works show limited task performance (e.g., around $50\%$ success rate for the training tasks). In contrast, our algorithm learns a vision-based manipulation task robustly ($90\%+$ success rates) and efficiently (117 videos, 90 trials) by utilizing the generalization ability of task embeddings [@rakelly2019efficient] and a novel Q-functioned IRL formulation. Preliminaries ============= Off-policy Reinforcement Learning via Soft Actor-Critic ------------------------------------------------------- Standard RL models a task $\mathcal{M}$ as an MDP defined by a state space $\mathcal{S}$, an initial state distribution $\rho_0 \in \Pi(\mathcal{S})$, an action space $\mathcal{A}$, a reward function $\mathcal{R}: \mathcal{S} \times \mathcal{A} \to \mathbb{R}$, a dynamics model $\mathcal{T}: \mathcal{S} \times \mathcal{A} \to \Pi(\mathcal{S})$, a discount factor $\gamma \in [0, 1)$, and a horizon $H$. Here, $\Pi(\cdot)$ defines a probability distribution over a set. The robot acts according to stochastic policy $\pi: \mathcal{S} \to \Pi(\mathcal{A})$, which specifies action probabilities for each $s$. Each policy $\pi$ has a corresponding $Q^\pi: \mathcal{S}\times\mathcal{A} \to \mathbb{R}$ function that defines the expected discounted cumulative reward for taking an action $a$ from $s$ and following $\pi$ onward. Off-policy RL, particularly Soft Actor-Critic (SAC) [@haarnoja2018soft], reuses historical experiences to improve learning sample efficiency by recovering a “soft” Q-function estimator $Q_{\theta}$. A policy can then be learned by minimizing the KL divergence between the policy distribution and the exponential-Q distribution: $\pi^* = \operatorname*{arg\,min}_{\pi \in \Pi} D_{KL} {\infdivx}{\pi(a \mid s)}{\frac{\exp(Q^{\pi_{old}}_{\theta}(s, a))}{Z(s)}}$ Timestep-centric IRL as Adversarial Imitation Learning {#sec:Timestep-centric} ------------------------------------------------------ The purpose of IRL is to learn the energy function $f_\theta$ implicit in the provided expert demonstrations and use $f_\theta$ to learn a policy that robustly matches the expert performance. In particular, timestep-centric IRL aims to recover an energy function $f_\theta(s, a)$ to rationalize and match the demonstrated expert’s action conditional distribution: $p_{\theta}(a \mid s) = \frac{\exp(f_\theta(s, a))}{Z_\theta} \propto \exp(f_\theta(s, a)) = \overline{p_{\theta}}(a \mid s)$, where $Z_\theta$ is the partition function, an integral over all possible actions given state $s$. In other words, IRL minimizes the KL divergence between the actual and predicted expert conditional action distributions: $\pi_E(a \mid s)$ and $p_{\theta}(a \mid s)$. Adversarial IRL [@fu2018learning][@ho2016generative] provides a sampling-based approximation to MatEntIRL [@ziebart2008maximum] in an adversarial manner. Specifically, AIRL [@fu2018learning] learns a generative policy $\pi_\psi$ and a binary discriminator $D_\theta$ derived from energy function $f_\theta$: $$\begin{aligned} \label{eq:dtheta} &D_\theta(s, a) = P((s, a) \text{ is generated by expert})\nonumber\\ &= \frac{\overline{p_{\theta}}(a \mid s) }{\overline{p_{\theta}}(a \mid s) + \pi_\psi(a \mid s)} = \frac{\exp (f_\theta(s, a))}{\exp (f_\theta(s, a)) + \pi_\psi(a \mid s)}\end{aligned}$$ and $\theta$ is trained to distinguish state-action pairs sampled from the expert vs. the policy, using binary cross entropy loss: $$\begin{aligned} \label{eq:discriminatorloss} \mathcal{L}^{IRL} = -\mathbb{E}&_{(s, a) \sim \pi_\psi, \pi_E}[y(s, a) \log(D_\theta(s, a)) \nonumber\\ &+ (1-y(s, a))\log(1-D_\theta(s, a))]\end{aligned}$$ where $y(s, a) = \mathds{1}\{(s, a) \text{ is generated by expert }\pi_E\}$. Meanwhile, the policy is trained to maximize the MaxEntIRL Objective [@ziebart2008maximum], or equivalently, to match the expert’s state-action joint distribution via reverse KL divergence [@divergence2019]. One-shot Meta-imitation Learning from A Single Video ---------------------------------------------------- In one-shot meta-imitation learning, the robot is trained to solve a large number of tasks drawn from a task distribution $p(\mathcal{M})$. The total number of tasks in this task distribution can be finite or infinite. Each imitation task $\mathcal{M}_{train}^i$ consists of a single video demonstration $\mathcal{D}^i_{\pi_E}$. During training, the robot can also generate limited practice trajectories (e.g., 90). For example, in the Pick-Pour-Place experiment in Fig.\[fig:intro\], the robot receives a single video demonstration for each of the 117 tasks. Each task is characterized by a different combination of container positions, or pouring into the green vs. the yellow container. At test time, the robot receives a single video of a new task $\mathcal{M}_{test}^i$ drawn from $p(\mathcal{M})$. For example, a new Pick-Pour-Place test task can be a *new* combination of container positions or pouring into a *new* container (e.g., the red or orange container). The robot then needs to solve this task the first time *without trial-and-error*. Embedding-based Meta-learning ----------------------------- Embedding-based meta-learning [@yu2019meta][@rakelly2019efficient] learns a task-specific embedding vector $z$ that contains task-level abstraction to adapt to a new but related task quickly. This method aims to learn a task-conditioned policy $\pi(a | s, z)$ that maximizes task-conditioned expected returns: $\max_\pi \mathbb{E}_{(s_t, a_t) \sim \pi, \rho_0} [\sum_{t=1}^T r(s_t, a_t | c) + \alpha \mathcal{H}(\pi(a_t|s_t, c))]$, by learning an embedding space $Z$ that maximizes the mutual information between $z$ and task context $c$. The goal is to make this learned embedding space generalizable to new tasks so that at test time, the policy can quickly adapt to unseen tasks with no or few practices. A key advantage of embedding-based meta-learning is the ability to learn from off-policy experiences. However, current methods are mostly if not only demonstrated in non-vision tasks in simulation. Mathematical Formulation for SQUIRL =================================== SQUIRL: Timestep-centric IRL as Soft Q-Learning {#sec:q} ----------------------------------------------- Previous works in timestep-centric IRL such as [@smile][@yu2019meta][@fu2018learning] have interpreted the energy function $f_\theta$ in Eq.\[eq:dtheta\] as a reward function $r_\theta$ and later recover a Q or advantage function based on reward $r_\theta$ for policy improvement. To improve IRL sample efficiency, we propose to *bypass* this reward learning and directly interpret $f_\theta(s,a)$ as the soft Q-function [@haarnoja2018soft] $Q^{\pi_{mix}}_\theta(s,a)$. This soft Q-function models the expert’s behavior as maximizing both the Q-value and its *entropy* (i.e., randomness) simultaneously. It also encourages the robot to explore the real world to imitate the expert more robustly. Under this formulation, approximating the expert’s conditional action distribution is equivalent to recovering a soft Q-function under which the expert is soft Q-optimal: $$\begin{aligned} &\operatorname*{arg\,min}_\theta D_{KL}{\infdivx}{\pi_E(a \mid s)}{p_{\theta}(a \mid s)} \nonumber\\ = &\operatorname*{arg\,max}_\theta \mathbb{E}_{a \sim \pi_E(a \mid s)} [Q^{\pi_{mix}}_\theta(s, a)] - \log Z_\theta \label{eq:softqtheta}\end{aligned}$$ Eq.\[eq:softqtheta\] rationalizes the expert behavior intuitively because the expert should be optimal with respect to the *cumulative* reward [@ziebart2010entropyirl], not the immediate reward. Here, $Q^{\pi_{mix}}_\theta$ is under a mixture policy $\pi_{mix}$ between the robot and expert’s policies. SQUIRL as Expert Imitation and Adversarial Learning {#sec:match} --------------------------------------------------- Under SQUIRL, the policy learning objective (Eq.\[eq:rl\]) is also equivalent (derivations on website) to matching: 1) the exponential-Q distribution of the discriminator $\theta$ (Eq.\[eq:match\]), 2) the generator’s objective in Generative Adversarial Networks (GANs) [@goodfellow2014generative] (Eq.\[eq:gan\]), and 3) the joint state-action distribution of expert [@divergence2019] (Eq.\[eq:joint\]): $\pi^* = \operatorname*{arg\,min}_{\pi \in \Pi} \mathcal{L}^{RL}(\pi)$, where $$\begin{aligned} \label{eq:rl}&\mathcal{L}^{RL}(\pi) =D_{KL} {\infdivx}{\pi_\psi(a \mid s)}{\frac{\exp{Q^{\pi_{mix}}_{\theta}(s, a)}}{Z(s)}} \\ \label{eq:match}&= D_{KL} {\infdivx}{\pi_\psi(a \mid s)}{p_\theta(a \mid s)}\\ \label{eq:gan}&= \mathbb{E}_{(s,a) \sim \pi_{mix}}[\log(1-D_\theta(s,a))-\log(D_\theta(s,a))]\\ \label{eq:joint}&= D_{KL} {\infdivx}{\rho_{\pi_\psi}(s, a)}{\rho_{\pi_E}(s, a)}\end{aligned}$$ Meanwhile, the discriminator $\theta$ is matching its Q-function to the log-distribution of the expert’s conditional action distribution (Section \[sec:Timestep-centric\]). Therefore, when this Q-function is optimal: $Q^{\pi_{mix}}_\theta = Q^{\pi_{mix}}_{\theta^*}$, the robot’s policy objective (Eq.\[eq:rl\]) is also matching the expert’s conditional action distribution: $$\label{eq:indirect} \psi^* = \operatorname*{arg\,min}_\psi E_{\rho_{\pi_{mix}}(s)} [D_{KL} {\infdivx}{\pi_\psi(a \mid s)}{\pi_E(a \mid s)}]$$ Comparison to the Behavioral Cloning (BC) Objective {#sec:bc} --------------------------------------------------- While BC attempts to learn a policy that also matches the expert’s conditional action distribution [@divergence2019], the *fundamental* difference is that the KL-divergence in BC’s case is computed under the *expert’s* narrow state distribution $\rho_{\pi_E}(s)$: $\psi_{BC}^* = \operatorname*{arg\,min}_\psi E_{\rho_{\pi_{E}}(s)} [D_{KL} {\infdivx}{\pi_E(a \mid s)}{\pi_\psi(a \mid s)}]$. In contrast, ours (Eq.\[eq:indirect\]) is computed under $\rho_{\pi_{mix}}(s)$: the state distribution of the *combined* *cumulative* experience of the robot and the expert, which is a much wider distribution than the expert distribution. We hypothesize that this, along with matching the joint state-action distribution of the expert (Eq.\[eq:joint\]), makes our algorithm less susceptible to compounding errors than BC, as experimentally tested in Section \[sec:exp\]. ![image](figures/architecture.png){width="\linewidth"} SQUIRL: Soft Q-functioned Meta-IRL ================================== Shown in Fig.\[fig:architecture\], our algorithm learns three neural networks jointly – a task encoder (yellow), a task-conditioned policy (orange), and a task-conditioned soft Q-function (green): 1. $\Psi_{\phi} (c)$: a **task encoder** that encodes a sampled batch of $C=64$ expert state-action pairs $c = \{s^i_{1:C}, a^i_{1:C}\}$ from a task $i$ into a single 32-dim embedding vector $z^i \in\mathbb{R}^{32}$ (by computing the mean vector across 64 embeddings) that enables generalization to new tasks. This batch of expert state-action pairs is randomly sampled and thus does not encode time information. Both the policy and the Q-function accept this embedding vector as input. 2. $\pi_\psi(s, z^i)$: a **task-conditioned policy** the robot uses to perform a task $i$ given state $s$ and the task embedding vector $z^i \in \mathbb{R}^{32}$ outputted by the task encoder $\Psi_{\phi}(c)$. 3. $Q_\theta(s,a,z^i)$: a **task-conditioned soft Q-function** used to train the policy $\pi_\psi(s, z^i)$ to more robustly mimic the expert’s behavior for the robotic manipulation task $i$. To begin, the robot is given an expert trajectory of state-action pairs $\mathcal{D}_{\pi_E}$ for each of the 117 training tasks. The robot first uses these expert trajectories to bootstrap training for both its policy $\pi_\psi$, and the task encoder $\Psi_\phi$ via behavioral cloning (Eq.\[eq:bc\]). This way, the robot can distinguish the train tasks better and learn more quickly in the real world. Next, the robot generates 10 trials (state-action pairs) $\overline{\mathcal{D}}_{\pi_\psi}$ *in the physical world* (not simulation) using its warmed-up policy and task encoder. Then, the robot uses both the expert’s and its state-action pairs to train a discriminator $\theta$. This discriminator classifies which state-action pairs come from the expert $\pi_E$ vs. the robot $\pi_\psi$. At first, the robot is distinctively worse than the expert at performing the tasks. This makes it easy for the discriminator to classify. By doing so, the discriminator learns a Q-function $Q^{\pi_{mix}}_\theta$ using Eq.\[eq:softqtheta\]. Using the learned Q-function $Q^{\pi_{mix}}_\theta$, the robot trains its policy $\pi_\psi$ via Eq.\[eq:rl\]. Meanwhile, the robot also has the option to continue updating its task-conditioned policy and task encoder via behavioral cloning (Eq.\[eq:bc\]). Since training the policy via Eq.\[eq:rl\] is equivalent to indirectly imitating the expert (Eq.\[eq:joint\] and \[eq:indirect\]), as derived in Section \[sec:match\], the trajectories generated by the policy gradually become more similar to the expert. This makes the state-action pairs more difficult for the discriminator to classify. This difficulty, in turn, forces the discriminator to learn a more precise Q-function, which then encourages the policy to mimic the expert even more closely. This cycle repeats until convergence (90 trials *in total*), at which point: 1) the policy matches the expert performance, 2) the task encoder learns to generalize to new tasks, and 3) the discriminator continues to struggle to distinguish state-action pairs correctly despite having learned an accurate Q-function. Rationale for Bypassing Reward Learning via SQUIRL -------------------------------------------------- SQUIRL learns a Q-function without rewards because 1) the policy is ultimately trained by the Q-function, not rewards, thus bypassing reward learning improves IRL sample efficiency, and 2) circumventing reward learning avoids off-policy Q-learning from a *constantly changing* reward function and makes training easier and more stable empirically. Architectures for Policy, Task Encoder, and Q-function ------------------------------------------------------ For all non-vision tasks, we parameterize $\pi_\psi, \Psi_\phi, Q_\theta$ with five fully-connected (FC) layers. For vision tasks, we use a 5-layer CNN followed by a spatial-softmax activation layer for the RGB image. This activation vector is then concatenated with the non-vision input vector and together passed through five FC layers. Our algorithm is *general* and works with many other network architectures, state, and action spaces. Incorporating BC to Bootstrap and Accelerate Learning ----------------------------------------------------- Since our algorithm’s IRL objective (Eq.\[eq:indirect\]) is compatible with BC, as explained in Section \[sec:bc\], our algorithm can jointly be trained with BC to stabilize and accelerate learning without conflicting gradient issues (line 16 in Algorithm \[algo:irl\]): $$\mathcal{L}^{BC} = \mathbb{E}_{(s, a) \sim \pi_E} [\left\lVert\pi_\psi (s, \Psi_\phi(c)) - a\right\rVert^2] \label{eq:bc}$$ This, combined with the off-policy nature of our algorithm, also allows the robot to bootstrap learning by first “pre-training” via BC (Eq.\[eq:bc\]) using the expert demonstrations, before improving performance further via meta-IRL training. **Input:** One expert video demonstration trajectory of state-action pairs $\mathcal{D}^i_{\pi_E}=\{s^i_{1:H}, a^i_{1:H}\}$ for each of the $n$ training tasks $i = 1:n$, where $H$ is the horizon of the task (e.g., $n=117, H=100$) Initialize soft Q-function $Q_\theta$, policy $\pi_\psi$, task encoder $\Psi_{\phi}$, and an empty buffer of off-policy robot trajectories $\mathcal{D}^i_{\pi_\psi} \leftarrow \{\}$ for each training task $i = 1:n$ Warm-up policy and task encoder via $\mathcal{L}^{BC}$ (Eq.\[eq:bc\]) Sample a batch of $m$ task indices $\{i^{1:m}\}$ from all training tasks $i=1:n$, (e.g., $m=10$) Infer task embedding $z^i=\mathbb{R}^\mathcal{Z} \leftarrow \Psi_\phi(c)$, where $c = \{s^i_{1:C}, a^i_{1:C}\} \sim \mathcal{D}^i_{\pi_E}$ (e.g., $\mathcal{Z} = 32, C=64$) Generate a robot trajectory of state-action pairs $\overline{\mathcal{D}}^i_{\pi_\psi} = \{s^i_{1:H}, a^i_{1:H}\}$ from task $i$ using $\pi_\psi, z^i$ $\mathcal{D}^i_{\pi_\psi} \leftarrow \mathcal{D}^i_{\pi_\psi} \cup \overline{\mathcal{D}}^i_{\pi_\psi}$ Sample another batch of $m$ task indices $\{i^{1:m}\}$ $\theta \leftarrow \theta - \nabla_\theta \mathcal{L}^{IRL}$ (Eq.\[eq:discriminatorloss\]) using a combined batch of $\mathcal{B}=128$ robot and expert timesteps: $\overline{\mathcal{D}}^i_{\pi_\psi} \cup \overline{\mathcal{D}}^i_{\pi_E}$ and $z^i$, where $\overline{\mathcal{D}}^i_{\pi_\psi} \sim \mathcal{D}^i_{\pi_\psi}$, $\overline{\mathcal{D}}^i_{\pi_E} \sim \mathcal{D}^i_{\pi_E}$, $i=\{i^{1:m}\}$ Sample another batch of $m$ task indices $\{i^{1:m}\}$ $\{\psi, \phi\} \leftarrow \{\psi, \phi\} - \nabla_{\psi, \phi} \mathcal{L}^{BC}$ (Eq.\[eq:bc\]) using a batch of $\mathcal{B}$ expert timesteps $\overline{\mathcal{D}}^i_{\pi_E} \sim \mathcal{D}^i_{\pi_E}, z^i$, $i=\{i^{1:m}\}$ **end if** $\psi \leftarrow \psi - \nabla_\psi \mathcal{L}^{RL}$ (Eq.\[eq:rl\]) using a combined batch of $\mathcal{B}$ robot and expert timesteps: $\overline{\mathcal{D}}^i_{\pi_\psi} \cup \overline{\mathcal{D}}^i_{\pi_E}$ and $z^i$, where $\overline{\mathcal{D}}^i_{\pi_\psi} \sim \mathcal{D}^i_{\pi_\psi}$, $\overline{\mathcal{D}}^i_{\pi_E} \sim \mathcal{D}^i_{\pi_E}$, $i=\{i^{1:m}\}$ **return** soft Q-function $Q_\theta$, policy $\pi_\psi$, task encoder $\Psi_{\phi}$ \[algo:irl\] **Input:** $\pi_\psi$, $\Psi_\phi$, $Q_\theta$, and a single expert video demonstration of state-action pairs $\mathcal{D}^i_{\pi_E}=\{s^i_{1:H}$, $a^i_{1:H}\}$ from a *new* task $i$ unseen during training Infer task embedding vector $z^i=\mathbb{R}^\mathcal{Z} \leftarrow \Psi_\phi(c)$, where $c = \{s^i_{1:C}, a^i_{1:C}\} \sim \mathcal{D}^i_{\pi_E}$ (e.g., $\mathcal{Z} = 32, C=64$) Rollout robot trajectory in the real world using $\pi_\psi$, $z^i$ \[algo:irltest\] Using Expert Demonstration as Both the Input Task Context Variables and Training Signal for the Task Encoder ------------------------------------------------------------------------------------------------------------ Learning robust task embeddings enables robots to generalize to new tasks quickly [@rakelly2019efficient]. To this end, our algorithm proposes to use 64 expert timesteps as the input task context variable $c$ into the task encoder, as opposed to 64 robot timesteps. This is because context variables should explore the task and environment sufficiently well to expose the key information of the task, and expert demonstration timesteps are an ideal candidate compared to the timesteps from the robot’s suboptimal policy. As a result, the context variable $c$ input into the task encoder only includes the states and actions of the expert, but not the rewards or the next states. In addition, we choose the BC loss $\mathcal{L}^{BC}$ in Eq.\[eq:bc\] as the training loss for learning the task encoder $\Psi_\phi$. This BC loss is stable since the expert timesteps are fixed. In contrast, the IRL loss $\mathcal{L}^{IRL}$ (Eq.\[eq:discriminatorloss\]) and the policy loss $\mathcal{L}^{RL}$ (Eq.\[eq:rl\]) are less stable because the training data distribution for both losses are non-stationary. This design choice also allows us to learn a robust task embeddings first via BC pre-training before performing meta-IRL training via SQUIRL. We empirically observe that such pre-training can improve the training stability and the sample efficiency of SQUIRL, but the final policy performance is similar with or without BC pre-training. In summary, our algorithm is detailed in Algorithm \[algo:irl\] (train) and Algorithm \[algo:irltest\] (test), with hyperparameters detailed here[^3]. Experiments and Results Analysis {#sec:exp} ================================ We evaluate the generality and robustness of our algorithm across long-horizon vision and non-vision tasks with continuous state and action spaces in both simulation (Pick-Carry-Drop, a horizon of 1024 timesteps, 30 train tasks) and real-world (Pick-Pour-Place, a horizon of 100 timesteps, 117 train tasks). There is only a *single* expert demonstration for *each* of the train or test tasks. We compare with the PEARL-BC baseline, which is the behavioral cloning version of PEARL [@rakelly2019efficient]. **Evaluation:** We evaluate real-robot and simulation experiments on **50** and **500** trials respectively across **50** seen and unseen tasks. We report mean and standard deviation (“stdev” hereafter). The performance difference between different experiments is statistically significant if the difference in **mean** is at least **either** standard deviation away. Experimental video is at <http://crlab.cs.columbia.edu/squirl>. Simulation Experiment: Pick-Carry-Drop -------------------------------------- **Description.** We modify the planar Stacker task [@dmcontrol] to create “Pick-Carry-Drop”. Shown in Fig.\[8PP-decompose\], a robot is tasked to approach, pick, carry, and drop the black box into the stack marked in green. The task is successful if the box is dropped into the stack within 1024 timesteps, and failed otherwise. **State Space.** We evaluate our algorithm on both the vision and the non-vision version of the task, to demonstrate that SQUIRL is *general* across different state space modalities. The state space for the vision version includes 1) the joint angles and velocities for its 5-DOFs, 2) a one-hot vector indicating the current stage of the task, and 3) an RGB image shown in Fig.\[8PP-decompose\]. The non-vision version’s state space replaces the RGB image with the *position of the black box*. **Action Space**. The robot controls its 5-DOF *joint torques*. **Task Definition**. There are a total of 30 training tasks in this experiment, each corresponding to a different *drop location*: $x \in \{-0.15, -0.14, \ldots , 0.14\}$. During test time, we randomly sample a new, *real-valued* drop location from the maximum valid range: $x \in [-0.25, 0.25]$. The green drop location is *invisible* in both the vision and the non-vision version of the task. Therefore, the robot needs to infer the green drop location (i.e., task information) solely from the provided expert video demonstration. On the other hand, the starting pose of the robot and the location of the black box are all initialized randomly at the beginning of each task. **Robot Trials**. The robot uses 150 training trials *in total*. **Expert Demonstration**. We trained an expert policy from scratch via RL to provide expert demonstrations. The reward function used to train the expert policy comprises of six stages, each stage with a reward of 10. Designing this reward function has taken significant human effort, which exhibits the value of directly learning from video demonstrations. [|c|c|c|c|c|]{} Tasks & Seen& Unseen & Seen& Unseen\ & &\ SQUIRL (BC + IRL) & **95.8$\pm$1.7** & **95.0$\pm$1.5** & **97.3$\pm$3.0** & **96.9$\pm$2.0**\ Baseline (PEARL-BC) & 77.8$\pm$1.6 & 76.5$\pm$0.7&90.8$\pm$2.5 & 89.5$\pm$1.6\ \ SQUIRL (IRL Only)& 93.8$\pm$1.8 & 93.2$\pm$1.6 & 94.7$\pm$1.7 & 93.9$\pm$1.4\ **Simulation Results and Analysis.** As shown in Table \[tab:sim\], our algorithm, “SQUIRL (BC + IRL)”, pre-trains via BC and then trains the policy using both the BC loss (Eq.\[eq:bc\]) and the IRL policy gradient loss (Eq.\[eq:rl\]). It statistically significantly outperforms the PEARL-BC baseline in both the vision (95.8%$\pm$1.7 vs. 77.8%$\pm$1.6) and non-vision (97.3%$\pm$3.0 vs. 90.8%$\pm$2.5) version of the task for seen tasks. For unseen tasks, we observed similar outperformance (95.0%$\pm$1.5 vs. 76.5%$\pm$0.7 in the vision case and 96.9%$\pm$2.0 vs. 89.5%$\pm$1.6 in the non-vision case). Qualitatively, in the PEARL-BC’s case, the robot sometimes misses the drop location as it attempts to drop the box or fails to pick up the box when the box gets stuck by the walls of the stack (kindly see website). The performance drop of the baseline from the non-vision version (90.8%$\pm$2.5 and 89.5%$\pm$1.6 for seen and unseen tasks) to the vision version (77.8%$\pm$1.6 and 76.5%$\pm$0.7 for seen and unseen tasks) is mainly because vision-based manipulation tends to suffer from larger compounding errors. Nevertheless, as evident in the statistical similarities between seen and unseen tasks for SQUIRL (95.8%$\pm$1.7 vs. 95.0%$\pm$1.5 for vision) and PEARL-BC (77.8%$\pm$1.6 vs. 76.5%$\pm$0.7 for vision), both algorithms can generalize to unseen tasks, due to the generalizability of task embeddings. **Ablation: IRL Gradient Only**. To compare the performance contribution of SQUIRL’s meta-IRL core training procedure directly against PEARL-BC, we created “SQUIRL (IRL only)”, which trains the policy using only the policy gradient loss in Eq.\[eq:rl\] (no BC joint training or pre-training). This *ablated* version still outperforms the PEARL-BC baseline (93.8%$\pm$1.8 vs. 77.8%$\pm$1.6 for seen vision tasks, 93.2%$\pm$1.6 vs. 76.5%$\pm$0.7 for unseen vision tasks). Nevertheless, by combining BC and IRL gradients, “SQUIRL (BC + IRL)” improves performance slightly further (95.8%$\pm$1.7 and 95.0%$\pm$1.5). Intuitively, while BC only matches the expert’s conditional action distribution under the *expert’s* state distribution, BC’s supervised learning signal is stabler than IRL. Joint training with BC and IRL gradients can be interpreted as combining the stability of BC and the robustness of Q-functioned IRL, by matching the conditional action distribution of the expert under the broader state distribution of the expert-robot mixture experience (Eq.\[eq:indirect\]), in addition to matching the expert’s joint state-action distribution (Eq.\[eq:joint\]). Real-Robot Experiment: Pick-Pour-Place -------------------------------------- **Description.** We evaluated our algorithm on the UR5-Seed robot (Fig.\[fig:hardware\]) to perform a set of long-horizon pick-pour-place tasks. As shown in Fig.\[fig:hardware\], in each task, there is a grey cylindrical bottle, an iron pebble that is already in the bottle, and more than one container on the table. The robot is tasked to approach and pick-up the grey bottle, pour the iron pebble into a specific container, and place the bottle back on the table. The task is a success only if the pebble is poured into the *correct* container and the bottle is placed upright on the table within $H=100$ timesteps, and a failure otherwise. **State Space.** The state space contains a top-down or 45camera’s RGB image (Fig.\[ppp\]), and 2 binary indicators for whether the robot has poured or closed the hand, respectively. **Action Space.** The action space includes the Cartesian unit directional vector for the end-effector movement. During each timestep, the robot can adjust the end-effector by 2cm along any 3D direction. The action space also includes a binary indicator to control the arm vs. the hand and a trinary indicator to close, open, or rotate the hand for pouring. **Orthogonality to State and Action Representions**. While Pick-Pour-Place can be tackled by first localizing the correct container via object detection (alternative state space) and then executing motion-planning trajectories to pour (alternative action space), our algorithm is *general* across and orthogonal to alternative state and action spaces. **Task Definition.** As shown in each row of images in Fig.\[fig:intro\], each task is defined by the positions and colors of the containers, and by the correct container to pour into. There are *always* *only* the green and yellow containers in the 117 train tasks. 25 of the 50 test tasks have the green and yellow containers at *new* positions. The remaining 25 test tasks *add* the red and the orange *unseen* containers, or either. Since there is always more than one container in the RGB image, the robot will not know which container to pour into *without* the expert demonstration. Therefore, the robot needs to depend solely on the task encoder’s ability to extract the correct task information from the expert demonstration. **Robot Trials**. The robot collects 90 training trials *in total*. **Expert Demonstration.** We collect demonstrations via teleoperation using a Flock of Birds sensor[^4]. Using the human wrist pose detected by the sensor in real-time, we move, open, close, or rotate the robot hand for pouring. We collected $117$ video demonstrations across 117 tasks for training. It takes 1-2 minutes to collect one demonstration. Tasks RGB Image Seen Unseen ------------------------ ---------------------------- ------------------ ------------------ SQUIRL (BC + IRL) **92.0$\pm$4.5** **90.0$\pm$7.1** Baseline (PEARL-BC) 70.0$\pm$7.1 68.0$\pm$11.0 Baseline (Standard-BC) 60.0$\pm$10.0 56.0$\pm$11.4 SQUIRL (BC + IRL) $45\degree$ (**Ablation**) 90.0$\pm$7.1 88.0$\pm$8.4 : Pick-Pour-Place Results (% Pour Success$\pm$Stdev)[]{data-label="tab:real"} **Real-robot Results and Analysis.** As shown in Table \[tab:real\], our algorithm outperforms the PEARL-BC baseline statistically significantly in both seen tasks (92.0%$\pm$4.5 vs. 70.0%$\pm$7.1) and unseen tasks (90.0%$\pm$7.1 vs. 68.0%$\pm$11.0). This observed outperformance mainly originates from our soft Q-functioned IRL formulation, which forces the robot to imitate the expert under a much wider state distribution provided by the expert-robot mixture trajectories, instead of the narrow state distribution of the expert demonstrations. This helps reduce compounding errors during task execution. The low performance of the PEARL-BC baseline is mainly due to additional compounding errors induced by real-world sensory noises such as unstable lighting conditions and small perturbation to camera positions. Qualitatively, the PEARL-BC baseline sometimes pours into the wrong container, misses the target container by a few centimeters, or moves past the target container while failing to pour in time (kindly see website for examples). Nevertheless, from the statistical similarity between seen and unseen tasks for both our algorithm (92.0%$\pm$4.5 vs. 90.0%$\pm$7.1) and PEARL-BC (70.0%$\pm$7.1 vs. 68.0%$\pm$11.0), we see that the learned task encoder is still effectively generalizing to a new, related task. **Comparison to the “Standard-BC” Baseline**. We also compared to “Standard-BC” (60.0%$\pm$10.0 and 56.0%$\pm$11.4 for seen and unseen tasks), which performs no meta-learning and learns every train or test task *independently* from scratch via BC. As a result, the neural network *overfits* to the single demonstration and fails to generalize to real-world sensory (camera) noises at test time. Note that Standard-BC’s unseen-task performance is slightly lower than seen tasks since the unseen tasks are more challenging with at most 4 containers on the table, compared to only 2 containers in seen tasks. **Ablation: Non-top-down Camera**. We also tested our algorithm with a $45\degree$ RGB image (90.0%$\pm$7.1 and 88.0%$\pm$8.4 for seen and unseen tasks) against a top-down RGB image (92.0%$\pm$4.5 and 90.0%$\pm$7.1 for seen and unseen tasks). The statistical similarity between the two shows that SQUIRL is *general* and can accept a non-top-down RGB input image. Conclusion ========== We introduced SQUIRL, a robust, efficient, and general Soft Q-functioned meta-IRL algorithm, towards enabling robots to learn from limited expert (one per task) and robot (90 in total) trajectories. This algorithm is statistically significantly more robust than behavioral cloning and requires no trial-and-errors at test time. Finally, this general algorithm has been tested to work with various long-horizon manipulation tasks, and across vision and non-vision state and action spaces. In the future, we will extend this algorithm to learn from direct human-arm demonstrations instead of teleoperation. This will lower the cost of collecting real-world expert demonstrations further. We also aim to incorporate hierarchical learning into SQUIRL to solve much longer horizon manipulation tasks by reusing low-level subpolicies. [^1]: This work is supported by NSF Grant CMMI-1734557. Authors are with Columbia University Robotics Group, New York, NY, 10027, USA [^2]: Site: [www.seedrobotics.com/rh8d-dexterous-hand.html](www.seedrobotics.com/rh8d-dexterous-hand.html) [^3]: Hyperparameters in Algorithm \[algo:irl\] and \[algo:irltest\]. Policy gradient batch size $\mathcal{B}$: 1024 (non-vision), 128 (vision); task embedding batch size $C$: 64; all learning rates: $3e^{-4}$; starting SAC alpha: $1e^{-5}$; SAC target entropy: $-300$; IRL updates per epoch $J$: $400$; policy updates per epoch $K$: $2000$; task embedding size $\mathcal{Z}$: 32; meta-batch size $m$: 10; discount rate $\gamma$: 0.99 [^4]: Flock of Birds is a 6D pose tracker from Ascension Technologies Corp.
Mid
[ 0.639784946236559, 29.75, 16.75 ]
Q: Variable didn't 'stick' to array I'm using twilio to send SMS's. If I insert my number directly 8881231234 it will work. This code below works: $client = new Services_Twilio($sid, $token); $message = $client->account->messages->sendMessage( '9991231234', // From a valid Twilio number '8881231234', // Text this number "Hello monkey!" //insert message here ); print $message->sid; but when I replace by adding record from database it wont work. Like below it wont work: echo $row2["handset"]; // I can see my number $client = new Services_Twilio($sid, $token); $message = $client->account->messages->sendMessage( '9991231234', // From a valid Twilio number '$row2["handset"]', // Text this number "Hello monkey!" ); print $message->sid; I echo $row2["handset"] and my numbers 8881231234 appear correctly. This also didn't work: $handset = '8881231234'; $client = new Services_Twilio($sid, $token); $message = $client->account->messages->sendMessage( '9991231234', // From a valid Twilio number '$handset', // Text this number "Hello monkey!" // insert message here ); print $message->sid; Why is that? Help me please. A: If you want a variable be interpreted as a variable, use double quote: $var = "$var2"; $var = '$var2'; does not work as excepted. It works with array too: $var = "$var2['whatever']"; Or simply do: $var = $var2['whatever']; With concatenation: $var = $var2['whatever']."suffix"; Well in your case you only want to do: $message = $client->account->messages->sendMessage( '9991231234', // From a valid Twilio number $row2["handset"], // Text this number "Hello monkey!" );
Mid
[ 0.653439153439153, 30.875, 16.375 ]
Q: Pointers of generic type? ok so i want to make a generic class that will change the value of a datatype. The reason i want to do this is so i can have undo and redo methods. I could write a class for each valuetype i need. I.E. double, int... but it would be much easier if i could create a generic class to do this. This is what i have class CommandChangeDouble : Command { double _previous; double _new; double* _objectRef; public unsafe CommandChangeDouble(double* o, double to) { _objectRef = o; _previous = *o; _new = to; *_objectRef = _new; } public unsafe void Undo() { *_objectRef = _previous; } public unsafe void Redo() { *_objectRef = _new; } } this is what i want class CommandChangeValue<T> : Command { T _previous; T _new; T* _objectRef; public unsafe CommandChangeValue(T* o, T to) { _objectRef = o; _previous = *o; _new = to; *_objectRef = _new; } public unsafe void Undo() { *_objectRef = _previous; } public unsafe void Redo() { *_objectRef = _new; } } but this gives me the error Error "Cannot take the address of, get the size of, or declare a pointer to a managed type ('T')" Is there a better way to do this or a way to get around this error? A: Just for the record you can get a pointer to a generic type or any other type using these methods.... /// <summary> /// Provides the current address of the given element /// </summary> /// <typeparam name="T"></typeparam> /// <param name="t"></param> /// <returns></returns> [System.Runtime.CompilerServices.MethodImpl(System.Runtime.CompilerServices.MethodImplOptions.AggressiveInlining)] public static System.IntPtr AddressOf<T>(T t) //refember ReferenceTypes are references to the CLRHeader //where TOriginal : struct { System.TypedReference reference = __makeref(t); return *(System.IntPtr*)(&reference); } [System.Runtime.CompilerServices.MethodImpl(System.Runtime.CompilerServices.MethodImplOptions.AggressiveInlining)] static System.IntPtr AddressOfRef<T>(ref T t) //refember ReferenceTypes are references to the CLRHeader //where TOriginal : struct { System.TypedReference reference = __makeref(t); System.TypedReference* pRef = &reference; return (System.IntPtr)pRef; //(&pRef) } I have used them along with a few others to implement a form of slicing used with Arrays. A: Instead of supplying a pointer to the value, supply a setter: class CommandChangeValue<T> : Command { T _previous; T _new; Action<T> _set; public CommandChangeValue(T value, Action<T> setValue, T newValue) { _previous = value; _new = newValue; _set = setValue; setValue(_new); } public void Undo() { _set(_previous); } public void Redo() { _set(_new); } } // ... double v = 42; var c = new CommandChangeValue(v, d => v = d, 99); A: C# 7.3 solved that issue with new generic constraint - unmanaged. Basically it allows to do something like that: void Hash<T>(T value) where T : unmanaged { // Okay fixed (T* p = &value) { ... } } Docs
Mid
[ 0.564516129032258, 21.875, 16.875 ]
The art of printing images with micro-fluid technology is relatively well known. A permanent or semi-permanent ejection head has access to a local or remote supply of fluid. The fluid ejects from an ejection zone to a print media in a pattern of pixels corresponding to images being printed. Over time, the fluid drops ejected from heads have become increasingly smaller to increase print resolution. Multiple ejection chips joined together are also known to make lengthy arrays, such as in page-wide printheads. In lengthy arrays, fluid ejections near boundaries of adjacent chips have been known to cause problems of image “stitching.” Registration needs to occur between fluid drops from adjacent firing elements, but getting them stitched together is difficult especially when the firing elements reside on different substrates. Also, stitching challenges increase as arrays grow into page-wide dimensions, or larger, since print quality improves as the print zone narrows in width. Some prior art designs with narrow print zones have introduced firing elements for colors shifted laterally by one fluid via to align lengthwise with a different color near terminal ends of their respective chips. This, however, complicates chip fabrication. In other designs, complex chip shapes have been observed. This too complicates fabrication. In still other designs, narrow print zones have tended to favor narrow ejection chips. Between colors, however, narrow chips leave little room to effectively seal off colors from adjacent colors. Narrow chips also have poor mechanical strength, which can cause elevated failure rates during subsequent assembly processes. They also leave limited space for distribution of power, signal and other routing of lines. Accordingly, a need exists to significantly improve conventional ejection chip designs for larger stitched arrays. The need extends not only to improving stitching, but to manufacturing. Additional benefits and alternatives are also sought when devising solutions.
High
[ 0.681592039800995, 34.25, 16 ]
Super Duper Weenie What started as the Super Duper Weenie truck became too small for owner Gary Zemola, who today sells nearly 2,000 dogs each week from his new, permanent locale. Guy's glad he could stop by because the hot dogs live up to their name; they're topped with handmade relish, bacon and spicy chili.
Low
[ 0.457831325301204, 28.5, 33.75 ]
Discussion Date Nut Bread and Cream Cheese I grew up eating these sandwiches. If I am not mistaken the brand name of the bread was Dromedary. It was a fixture on the Chock Full O'Nuts menu. The last time I saw it on a menu was also in NY at The Bagel on West 4th St. They no longer have it however. I was wondering if anyone knew of a bakery big or small that still makes date nut bread, or a restaurant that still serves these heavenly sandwiches. Thanks!! Thanks so much for the Dromedary info. I live in Nashville TN and had looked in several stores because datenut bread and cream cheese sandwiches were "requested" for a family get together. I too recalled it was Dromedary but all of the store managers told me they did not carry it any longer. Thanks again, my Kroger deli does carry a date nut bread that is ok, but not like the memories of the Dromedary. Hi, I've been looking for recipes for Date Nut Bread just like I used to have in New York at Chock Full O' Nuts. I will try Dromidary link. If you ever come up with a recipe that tastes like what we remember please forward to me.Thanks, Estelle Dromedary date & nut roll is available from the Vermont Country Store. I too have been looking for a long time, especially around the holidays. It was a great treat then, my Mom loved it. We used to get it canned at any grocery store. I just received my Vermont Store catalog & low & behold they have it!! I've been on a kick lately with date nut bread and cream cheese. Cannot find Thomas brand, which was the standard in New York city area, but have been buying Nuemanns brand, usually in the deli section at supermarkets, it's not bad. Maybe a tad drier. It's made in Illinois, so I assume it's widely available. Vermont Country Store does have the date and nut bread, but it's made exclusively for them - no brand name like "Dromedary" on the can. - Just type in "date and nut bread" in the search box and voila! But, be warned - not cheap! $13.90 for two cans that are 8 oz. each - and you must buy as a set of two! Hope this helps. If you go to the link below and slide down to -DromedaryHome Use Date Nut Roll/Cake Mixes-you'll find info about either the Dromedary Date Bread boxed mix or the Dromedary Date Nut Roll (a canned bread.) These were the base for my mom's date bread/cream cheese sandwiches and they are still available in retail markets. What I remember is a really dark, moist, almost gooey date-nut bread. I have been looking for a recipe for years, but the only ones I can find are all basically the same, calling for soaking the dates in boiling water. They produce a light, dry quick bread type bread.Does anyone have a recipe for the other kind? this is so much like a recipe i used to make for date nut bread that produced the most moist and delicious loaf. I don't remember my instructions stating to let this stand for one day before cutting --- i don't think i could have waited that long! I made your recipe and it's quite tasty. Thank you. The one I remember is like the one described above by Ruth Arcone.-"dark, moist, and almost gooey." I used to get it at Alexander's market in southern California, but my parents were from Hoboken so that would seem to tie in with all the East Coasters here. For many years, this was my Mother's signature dish. She did make it from scratch at times, but usually she used the Dromedary Box Mix. I remember her soaking the dates in boiling water and she always added walnuts.This was then cooked in a large loaf pan. Always very moist, dark and gooey. Thanks for bringing up such a favorite memory. Those sandwhiches were awesome. I, too, was remembering enjoying VandeKamps Date Nut Bread and found a recipe that I tried; I was thrilled with how it tasted like the one I remember. Especially when I spread it with cream cheese! Yum! Preheat oven to 350 degrees F.In a medium bowl, pour water over the dates and butter. Stir and let the mixture sit until lukewarm Puree 1/3 of the mixture in a food processor or blender to make a paste, then stir it back into the date mixture. Add the brown sugar, molasses and eggs. Stir until everything is thoroughly combined. In a separate large bowl, sift together the flour, baking powder, baking soda, and salt Make a well in the center and pour in the date mixture. Mix until all the ingredients are combined. Pour the batter into a greased 9x5" loaf pan. Bake for 50 minutes; loaf is done when the top has risen and a cake tester inserted in the center will have some dates clinging to it but no batter. Remove the bread from the oven and cool it on a rack for 10 minutes before turning it out of the pan to finish cooling. This is almost the exxact same as the one my Mom used. Also, her signature dish during the holidays. Very dark, moist and so good warm with CC. The molasses, I believe was the key ingredient that most recipes leave out. Kathy John's near UConn, Storrs, Connecticut (old-fashioned soda fountain & ice cream parlour) used to serve delicious ones. Our family used to go, must have been the late 70's last time I was there, so.... They had a penny-candy shop then too. If you're nearby try & see: 643 Middle Turnpike, Storrs, 06268, 860-429-0362.
Mid
[ 0.562642369020501, 30.875, 24 ]
Women’s soccer defense steps up but loses 1-0 versus Solano Community College With four games scheduled in the next 10 days the American River College women’s soccer team looks to bounce back from a 1-0 loss suffered at the feet of Solano Community College, Sept. 17. The Beavers started the game off with the ball, but would watch as the Falcon’s sophomore forward Angie Dooley would put shot after shot slightly off target from the goal. On her third attempt Dooley would finish with a bicycle kick that would put SCC in the lead 1-0. “We talked in the pregame about the first 10 minutes,” head coach Paul Arellaneas said. “Coming out strong and dictating the pace of the game, and taking over the game and instead we give up a score in the first 10 minutes.” The ARC offense did put pressure on the Falcon’s defense, with several shot attempts that just weren’t followed up by the Beavers. Sophomore defender Kelsey Stillwell put several shots on goal and also kicked the corner kicks, one of which was close to scoring. Arellanes is skeptical with the way the women played but hopes they will put the pieces together in order to finally get the women to play a complete game. “We played all right, except we would get 35 yards from goal, and we would just lose sight of what we were trying to do,” Arellanes said. “We didn’t have anyone put themselves in front of the goal and run into one.” The loss drops ARC to 1-3 for the season. “Right now we are kind of struggling and when you’re struggling you’ve got to do all the extra stuff,” Arellanes said. “You gotta put yourself in positions, and you’ve got to get yourself going and we just didn’t do enough of that today.” The Beavers next match will take place Friday Sept. 20 versus Fresno City College at ARC beginning at 4 p.m.
Mid
[ 0.5750000000000001, 40.25, 29.75 ]
20100531 did you know that the house that fried chicken built has a bakery? it's a pretty good one, too. it's called max's corner bakery and you can find it...in the corner of max's restaurants. HA. some of them anyway. i was walking by the one near my flat early one morning, and came across this lovely tableau of assorted pastries, waiting to be arranged on their tidy shelves. i rather like where they are. 20100525 whoo, carne! although i had not been a previous fan of brazilian barbecue-style restaurants, i gotta say, the owners of churrasco brazilian bbq and salad bar in tumon are totally canny for bringing the rodízio-style all-you-can-eat meat festival to guam. and even more genius for keeping the prices relatively reasonable, and hopefully keeping the quality high. churrasco opened last month in the former mac and marti's space in pacific bay hotel. it is a light-filled dining room with a glass-enclosed wine room at the entrance, a sleek bar behind it, outdoor seating in the hotel's courtyard, and a glass-enclosed grilling area at the back. the restaurant does not take reservations, but the dining room is large, and despite the enormous salad bar off to one side, they manage to create walkable aisles so you don't go bumping into everyone on your way to and fro. the basic set up: you get your salads from the nicely varied salad bar at your leisure. at lunchtime, there is a hot food station with various starches--rice, red rice, and mashed potato, along with black beans and steamed or sauteed vegetables. at dinnertime, this is replaced with a cheese and bread board, along with smoked salmon and typical accoutrements, with the starches, beans, and veggies served at your table. at your table, you'll find a little plastic chip that says "yes" on one side, "no" on the other. flip to "yes", it means the roaming gaucho-esque servers with swords of grilled meats will stop at your table, then carve and/or serve whatever they have on offer; "no" technically means you're not ready for more, but the genial servers will sometimes stop anyway (just in case you don't really mean it). brazilian barbecue is usually just salt rubbed cuts of beef or pork, grilled on an open fire--the flavour comes from the cut of meat and can be enhanced with various sauces. at lunch we were offered mostly beef cuts--i don't remember them all but do recall picanha, or rump cover steak (part of the top sirloin cut), brisket, and tenderloin. the picanha has a strong, marked flavour--think less beef, more cow. the salt coating was quite noticeable and none of the cuts were particularly tender; however, when we returned for dinner a few weeks' later, the salt coating was more moderate and the meat noticeably tender. i appreciated the fact that most of the cuts were medium rare to rare once carved; however, if you prefer well-done meat, they will bring well-done carvings from the kitchen. we were also offered pork ribs (meaty, tender but still resilient), two types of pork sausage--one smoked, one cured--and two types of pork loin--one that may have been basted in barbecue sauce, and the other encrusted in parmesan cheese. the sausages were lovely, rustic and juicy, but both pork loins were tough and stringy each time we dined there. the surprise hits for us were the chicken offerings--marinated bone-in chicken thighs with crispy skin, and bacon-wrapped boneless pieces. both were moist, tender, and actually tasted of chicken. unfortunately, churrasco does not have any regular seafood offerings (although i heard there were lobster tails on mother's day), but we had a surprisingly tasty grilled pineapple at dinner. churrasco has five sauces: a thin vinegar based barbecue sauce, two kinds of finadene (regular and a reduction), red wine vinegar, and a chimichurri-type sauce. the chimichurri here is different from the one i am normally accustomed, which is a green sauce made with garlic, parsley, vinegar and olive oil. this one is red, possibly from finely minced red bell peppers, along with garlic, vinegar and olive oil. none of the sauces are particularly spicy, but they do pack quite a bit of flavour nonetheless. the serving containers are cute as all get out, but the ultra-stylish spoons are a little unwieldy; it's easier just to take them out and pour it directly from the palm-sized flask. i personally did not find a need for the sauces, but i appreciated that they enhanced the flavour of the meat instead of masking it. the starches available were somewhat disappointing; although the red rice was good, the white rice was surprisingly overcooked and mushy. i like the mash potato, which seems to be nothing more than potato, mashed--i didn't detect much seasoning. the fried yucca offered at dinner weren't particularly crispy and i suspect weren't actually yucca, but sweet potato (these were too orange and mushy). the nicest carb on offer are the small pao de queijo, or gougères. think cheese-topped cream puffs without a filling. i do want to note that one of the things i dislike about most brazilian barbecue places is the saltiness of the food--not just the grilled meats but also all the sides. luckily at churrasco, they have a light hand with the seasoning of all the side dishes, and the barbecues are the least salty of any i've tried. we capped our lunch with a small pudim de leite condensado, or brazilian-style flan. it was firm and very, very rich--muy condensado, lol--so much so that the whipped cream, caramel, and white chocolate chips actually cut through the milky fattiness. eep. i like this place. the prices are reasonable--$19.99 for lunch, $33.75 for dinner--and the quality of food and service are high. it's a good place for a celebration, or to take out-of-town guests, but probably not so good for vegetarians or pescatarians. (however, the salad bar is fresh and abundant, and there is a bar tapas menu that has a couple seafood offerings.) i've only dined there twice, but there was marked improvement between visits. i will definitely return to see how they continue to fare. DISCLAIMER: this is a personal journal with no desires to be anything but. it contains my opinion with occasional fact thrown in; recipes have been tested where noted, in an unairconditioned kitchen in the tropics. YMMV. for my sake and yours, consult a professional!
Mid
[ 0.538297872340425, 31.625, 27.125 ]
Friday, June 14, 2013 For Real? Crime is actually a funny thing. What is considered legal in one country might not be considered so in another. What is considered taboo in one country might be totally allowed in another. Case in point: Sweden It would seem that next year, Sweden will introduce a total ban on bestiality. Bestiality means a sexual act between a human and an animal and it would seem in Sweden, right nor it is legal unless cruelty to the animal could be proven! Seriously? Bestiality is only an offence if it can be proven that it is cruel to the animal? For real? Man, that’s hilarious. I would thought that the every act of bestiality would be enough proof of cruelty to the poor animal but evidently, it's not enough for the Swedes! I wonder if any people in Sweden ever got off on that technicality.
Low
[ 0.45684210526315705, 27.125, 32.25 ]
Navigation Menu: Social Icons Chicken Shish Tawouk – Classic Lebanese Recipe Shish tawouk is the classic Lebanese marinade for barbecue chicken and is my favourite wrap filling. The Lebanese love any opportunity to grill chicken and meat; we don’t just wait for good weather like here in the UK. I’ve seen people light the grill in the middle of winter and they see it as just another way of cooking rather than only at special occasions. There are lots of variations of shish tawouk especially when you go from one country to another in the Middle East, but the common factor is a creamy garlic flavour with an orange colour, which is a result of the paprika. Some people like to use yoghurt, garlic powder, mayonnaise and ketchup but I got this recipe from my chef friend who works at my favourite Lebanese deli and he uses traditional garlic sauce as the base which gives it a wonderful zingy flavour. My garlic sauce recipe can be found here, you might as well make some to go with the chicken anyway. Shish tawouk should be subtly spiced so adding chilli would turn it into another thing altogether, white or black pepper is acceptable and a good paprika will also add depth and colour. Though the classic way is to barbecue you can also shallow fry the chicken pieces and grill them in the oven, which I often do before I add chicken to curries or stews. Finally, to make the perfect chicken wrap get some extra fresh Lebanese flat bread, hand cut and fry some chips, get some spicy (unsweet) pickles and a good dollop of fresh garlic sauce. Make your chicken wrap with these ingredients and for a finishing touch hot press it in a panini grill for half a minute and then you will be on your way to becoming a wrap connoisseur, which is a life goal in itself 😝 Reader Interactions Primary Sidebar ....or as we Lebanese say; Ahla w Sehla! :) Here you'll find recipes collected from my Lebanese Mama, some regional classics and some secret family recipes. I come from a family of exceptional home cooks and I don't think I even went to a proper restaurant until I went to college, whereby I tried everything only to realise I'd been raised on gourmet food without even knowing it. My Teta (grandmother) was a legendary cook from Lebanon who could rustle up a feast out of nothing. My mother too ...
Mid
[ 0.6042216358839051, 28.625, 18.75 ]
The New Zealand dollar fell against most major currencies as the looming US fiscal cliff sapped risk appetite, stoking demand for the greenback, and investors continued to unwind long positions in the kiwi and Australian dollars. The New Zealand dollar fell to 81.76USc from 82.15USc in Asian trading yesterday. The trade-weighted index fell to 73.33 from 73.68. President Barack Obama is set to return to Washington early Thursday (US time) as he attempts to forge an agreement between Democrats and Republicans to prevent about $US600 billion in tax increases and spending cuts from taking effect on January 1. As the deadline looms, the greenback has strengthened as investors are drawn back to the world's reserve currency. "The fiscal cliff cannot be doing any favours" for growth-linked currencies such as the kiwi, said Tim Kelleher, head of institutional FX sales at ASB Institutional. The kiwi has also fallen amid "a continuation of the unwinding of long positions," he said. A long position is a bet a security or currency is set to rise. The kiwi dollar was "overheated" when it topped 84USc in mid-December, he said. Still, the currency should find support around 81.50USc because exporters "are pretty happy to buy back down here." The kiwi dollar traded at ¥70.05 from ¥70.08 late yesterday. Japan's next finance minister, Taro Aso, reportedly said the government was looking at comprehensive measures to counter the yen's strength. The kiwi fell to 50.70p from 50.90p and dropped to €0.61.82 from €0.62.20. It declined to 78.85Ac from 79.29Ac.
Low
[ 0.5036764705882351, 34.25, 33.75 ]
Elijah: You listen to me, okay? Anything happens to her, I won't ever forgive this. Klaus: One doesn't need forgiveness from enemies. And that's where we are, you and I. We're certainly no longer family.
Low
[ 0.47264770240700205, 27, 30.125 ]
New Customer SinkBase™ Plus Sink tidy set SinkBase™ Plus £20.00 Sink tidy set Availability:In stock This 3-piece set consists of an easy-press soap pump, for hand soaps and lotions, alongside an integrated sink tidy with separate compartments for storing a washing up brush and sponge and a refillable squeezy detergent bottle.
Mid
[ 0.59860788863109, 32.25, 21.625 ]
Story highlights White House complains of investigations but its reluctant responses contribute to GOP charge Republicans have undermined their claims of oversight that Democrats call a witch hunt Possible presidential candidates' involvement makes 2016 jockeying a factor Former CIA director says there is still a lack of clarity on what biggest security lapses were Nearly a year later, Benghazi remains a flashpoint in Washington for two very different reasons: indefensible pre-attack policy decisions and irresistible post-attack politics. The Obama White House, from the president on down, complains of "phony" Republican-led congressional investigations. Yet the administration's own reluctant, and at times inaccurate, responses to congressional inquiries have contributed to the GOP charge that the administration, at a minimum, has been less than transparent. "We need to get to the bottom of what happened that terrible night, why it happened, and how we can prevent similar tragedies in the future," House Speaker John Boehner said last week in serving notice the House Benghazi investigations would continue into the fall, and include new subpoenas for documents and testimony if necessary. There are legitimate questions about why repeated and specific warnings about the Benghazi security situation were undervalued or ignored. Both lawmakers and intelligence professionals point to this weekend's unprecedented wave of Middle East and Africa embassy closings as, at least in part, a lesson learned from the September 11, 2012, attack that killed Ambassador Chris Stevens and three other Americans. Republicans, however, have at times undermined their own claim to be interested only in legitimate congressional oversight, not what Democrats often label a partisan witch-hunt. Boehner, for example, has at times privately urged lawmakers leading the investigations to focus on what the evidence shows -- and not let their partisan instincts allow their public rhetoric to get out ahead of the facts. Photos: Photos: Attack on U.S. mission in Benghazi Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – Attackers set the U.S. mission in Benghazi, Libya, on fire on September 11, 2012. The U.S. ambassador to Libya, Christopher Stevens, and three other U.S. nationals were killed during the attack. The Obama administration initially thought the attack was carried out by an angry mob responding to a video, made in the United States, that mocked Islam and the Prophet Mohammed. But the storming of the mission was later determined to have been a terrorist attack. Hide Caption 1 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – Obama and Clinton stand at Andrews Air Force Base as the bodies of the four Americans killed are returned on September 14. Hide Caption 2 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – A desk sits inside the burnt U.S. mission on September 13, two days after the attack. Hide Caption 3 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – Damage is seen inside the U.S. mission on September 13. Hide Caption 4 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – A lounge chair and umbrella float in the swimming pool of the U.S. mission on September 13. Hide Caption 5 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – Demonstrators gather in Libya on September 12 to condemn the killers and voice support for the victims. Hide Caption 6 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – U.S. President Barack Obama, with Secretary of State Hillary Clinton on September 12, makes a statement at the White House about Stevens' death. Hide Caption 7 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – A burnt vehicle is seen at the U.S. mission in Benghazi on September 12. Hide Caption 8 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – People inspect the damage on September 12. Hide Caption 9 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – A small American flag is seen in the rubble on September 12. Hide Caption 10 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – A man stands in part of a burned-out building of the U.S. mission on September 12. Hide Caption 11 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – Smoke and fire damage is evident inside a building on September 12. Hide Caption 12 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – Half-burnt debris and ash cover the floor of one of the U.S. mission buildings on September 12. Hide Caption 13 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – The U.S. mission is seen in flames on September 11, the day of the attack. Hide Caption 14 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – A protester reacts as the U.S. mission burns on September 11. Hide Caption 15 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – A vehicle and the surrounding area are engulfed in flames on September 11. Hide Caption 16 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – Flames erupt outside of a building on September 11. Hide Caption 17 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – A vehicle burns during the attack on the U.S. mission on September 11. Hide Caption 18 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – Onlookers record the damage from the attack on September 11. Hide Caption 19 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – Onlookers walk past a burning truck and building on September 11. Hide Caption 20 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – A vehicle sits smoldering in flames on September 11. Hide Caption 21 of 22 Photos: Photos: Attack on U.S. mission in Benghazi Attack on U.S. mission in Benghazi – People duck flames outside a building on September 11. Hide Caption 22 of 22 JUST WATCHED What is the truth about Benghazi? Replay More Videos ... MUST WATCH What is the truth about Benghazi? 01:43 JUST WATCHED The CIA's secret presence in Benghazi Replay More Videos ... MUST WATCH The CIA's secret presence in Benghazi 05:28 JUST WATCHED Benghazi witness: No one questioned me Replay More Videos ... MUST WATCH Benghazi witness: No one questioned me 03:48 Also undermining the GOP effort: fund-raising e-mails and videos from Republican and conservative groups asserting a Benghazi cover up orchestrated by President Barack Obama and then-Secretary of State Hillary Clinton. "You've got a very valid point," Rep. Darrell Issa, chairman of the committee leading the House Benghazi review told CNN in an interview for "The Truth About Benghazi," a one-hour program looking at the attack and at the lingering policy and political questions. "I would prefer that fund-raising by outside groups stay away from the hard work of Congress. "But it isn't going to happen." Early 2016 jockeying also factors into the politics. Kentucky GOP Sen. Rand Paul says Clinton is responsible for the sub-par security in Benghazi even if, as she says, the stream of warnings and requests for more personnel never reached her desk. "That's precisely her culpability," Paul told CNN. "When you lead the State Department, decisions in one of the most dangerous countries in the world should rise to your level. That's your job to make sure those messages get to you." GOP strategist Kristen Soltis Anderson understands the GOP effort to use Benghazi to tarnish Clinton's image, but describes her as the most "formidable" Democratic 2016 hope and adds, "I don't know that Benghazi alone would sink a Clinton candidacy for president." And if the attacks now are somehow designed to discourage Clinton from running, veteran Democratic strategist and Clinton ally Paul Begala suggests an opposite reaction. "She's never been a person to back to down to a bully," Begala said in an interview. "Hillary is the type of person to be motivated by that. To stand up and fight back." Benghazi politics often get more attention because of the personalities involved. But there is also a policy divide. JUST WATCHED Return to Benghazi: Embassy under attack Replay More Videos ... MUST WATCH Return to Benghazi: Embassy under attack 07:39 JUST WATCHED Return to Benghazi: A city divided Replay More Videos ... MUST WATCH Return to Benghazi: A city divided 05:25 JUST WATCHED Return to Benghazi: Questions unanswered Replay More Videos ... MUST WATCH Return to Benghazi: Questions unanswered 09:46 Republicans say they do not yet have a full picture of three critical issues: • Why the warnings didn't reach the point where the State Department either sent more security help or ordered the Benghazi mission closed. • Why, especially given the weeks of threat warnings, there was no viable military option to assist the State Department personnel at the Benghazi mission and the predominantly CIA-run annex that came under attack later same evening and where two of the four Americans were killed. • And why, nearly a year later, no one has been brought to justice. New FBI Director James Comey is being pressed to update Congress on the investigation within a month of his officially beginning work next month. On the military response question, the Pentagon now says it is making significant improvements in its contingency planning for responding to embassies in danger zones. But former Pentagon brass told Congress there was no viable option that night, with then-Defense Secretary Leon Panetta saying the military "should not be a 911 service capable of being on the scene within minutes." The top Democrat on the House Armed Services Committee, Rep. Adam Smith of Washington, calls Benghazi a tragedy but labels continued GOP questioning a witch hunt. "The bottom line is there was not a force available that could get there in time," Smith told CNN. "So I don't think these questions need to be asked again." GOP Rep. Jason Chaffetz, however, says that his classified briefings have included information that convince him more could have been done. "How is it that we have a man down, in this case four men down and an injured person, and the cavalry never comes over the hill," Chaffetz said. On the first question, the administration's official review, by what is known as the Accountability Review Board, found a series of State Department bureaucratic failures at several levels, but found no negligence. "A whitewash," is how Issa describes that analysis. That process was led by veteran diplomat Thomas Pickering, who has served in both Democratic and Republican administrations. Pickering defended the integrity of the review in the weeks after its release. He several times, however, canceled scheduled interviews with CNN and ultimately said his attorney had advised him not to speak to the network. Now, House investigators are pursing documents the review board used in its review and this is likely to be one fall focus. Former CIA Director Michael Hayden, the retired Air Force general and a veteran of many Washington dramas, said GOP talk of a cover up is "a loaded word." But he says there is, nearly a year later, a lack of full clarity in determining where the biggest security related mistakes were made. "This is team ball," Hayden said. "There are a lot of people who now look back and say, 'I should have done that. I could have done that. Maybe I could have prevented this.'"
Mid
[ 0.54697286012526, 32.75, 27.125 ]
HCL says strong dollar likely to hit revenue in December quarter New Delhi: HCL Technologies Ltd, India’s fourth largest software services exporter, on Tuesday said the strengthening dollar against global currencies including the British pound, euro and Australian dollar is likely to have an adverse impact on the company’s revenues for the three months ended December. The Noida-headquartered company has estimated an impact of about 210 basis points on its December quarter dollar revenue. One basis point is one-hundredth of a percentage point. “Since the company’s revenues are derived in multiple currencies, the revenues for the quarter to be reported in US Dollar would have adverse impact of 210 bps on account of strengthening of US Dollar against various global currencies,” the company said in a statement. The treasury income is likely to be lower by about 5% in the October-December quarter compared with the three months ended September, when the company reported a treasury income of $33.4 million. It had posted 1.9 % sequential growth for the September quarter in dollar terms after taking into account the adverse impact of 130 basis points owing to the movement in various currencies. The company had also recorded capital gains of $25.2 million on sale of property. It now expects to post forex gain of $2 million for the quarter, covering the impact of both cash flow hedges and mark-to-market of the foreign currency assets and liabilities, as against the loss of $2.5 million estimated at beginning of quarter on the account of cash flow hedges. The company expects effective tax rate to be in the guided range of 21% to 22%. The shares of HCL Technologies fell by 1.13% to Rs.1,569 at 9:17am, while the benchmark Sensex rose 0.03% to 27,709.87 points at 9:24am.
Mid
[ 0.5439672801635991, 33.25, 27.875 ]
630 P.2d 217 (1981) In the Matter of A.J.S. Youth In Need of Care. No. 80-483. Supreme Court of Montana. Submitted on Briefs April 8, 1981. Decided June 17, 1981. Rehearing Denied July 17, 1981. *218 Jones Law Firm, Billings, for appellant. Harold F. Hanser, County Atty., Olsen, Christensen & Gannett, Billings, for respondent. SHEEHY, Justice. DS, mother of AJS, appeals from an order of the Thirteenth Judicial District Court, Yellowstone County, declaring AJS an abused and neglected child and awarding permanent custody of AJS to the Department of Social and Rehabilitation Services (SRS). We affirm. *219 Appellant raises these issues: 1. Was the evidence sufficient to support the finding that AJS is a youth in need of care? 2. Is the testimony of a psychologist subsequent to a court-ordered psychological evaluation violative of the psychologist-client privilege? 3. Did the admission of psychologists' testimony resulting from a court-ordered psychological evaluation violate DS's constitutional right of privacy? 4. Does the delay in the adjudication of this matter necessitate reversal? AJS was born on December 16, 1963, mentally retarded, possibly autistic and with epilepsy, characterized by both grand and petit mal seizures. DS and OS are the natural parents of the youth. OS abandoned the family in 1967 and has had no contact with the family since. DS was subsequently married to a man whom she divorced after discovering the husband sexually abusing AJS. At the time AJS was removed from the family home, DS was living with a man 11 years her junior, in whose care AJS frequently was entrusted. AJS first began attendance in special education classes at Garfield School in 1972, and has attended continuously since that time. Despite her years of education, AJS is not toilet trained, has very little speech and is considered nonverbal. She functions at approximately a two-year-old developmental level. DS raised and cared for AJS without interference by the authorities until late 1976. At that time, DS placed herself in a six-week drug rehabilitation program to overcome her twelve-year dependence on Darvon and Librium and left AJS in the care of a foster home. During this period, AJS's appearance and cleanliness improved dramatically, her reported seizure activity subsided and her classroom attitude and aptitude improved. All these conditions deteriorated when AJS returned to her mother's household. School officials and SRS personnel had from the outset been concerned about the squalid condition of DS's household. The home was consistently filthy, cluttered, frequently had animal excretions scattered about, and had an odor which nauseated visitors to the point that it was difficult for the unaccustomed to remain in the home. DS allowed the house to be used as a flop-house by friends of her other children. These conditions prevailed both before and after the 1976 drug rehabilitation. While in the care of her mother, the state of AJS's cleanliness and personal hygiene had been distressing to school and SRS personnel from the time her schooling commenced. She frequently came to school with body odor so intensive she was difficult to approach closely, her hair was often greasy and matted with food, and she frequently displayed brown phlegm (apparently a side-effect of Dilantin, her anticonvulsant) hanging from her teeth. AJS occasionally arrived at school unfed, and often slept through large portions of the school day. DS sometimes varied AJS's Dilantin dosages according to the phases of the moon. Beginning in 1976, school officials also began observing an unusual number of bruises on AJS. Her teacher and the school nurse each noticed, on numerous occasions, fingermarks on the inner aspect of AJS's upper thighs and bruises on both shoulders. When queried about the various bruises, DS typically dismissed them as resulting from falls during seizures (although teachers had observed that AJS knew when a seizure was at hand and would protect herself by lying on a bed prior to onset of the seizure). In 1979, bruising and injuries to AJS grew drastically more pronounced and frequent. On January 24, AJS arrived at school with a large bruise extending from her right shoulder to her elbow, with a long scratch down the center. On January 26, AJS had several large, dark, streak-type bruises — believed by the nurse to be fingermarks — on the inner portions of each thigh. On February 14, AJS displayed small bruises on her cheeks and nose, and a raised bright red rash over the entire upper portion of her back, with small abrasions in the *220 center of the rash. On February 19, she had six large, deep scratches, each about three inches long, on her left cheek. On February 26, a social worker visiting the home, noticed two black eyes on AJS. Finally, on February 28, the social worker and school nurse visited the home and observed a second-to-third-degree burn approximately ten centimeters long on her left shoulder. She also had a bruise around her left eye across the bridge of her nose, small bruises on her midchest, a small scratch on her upper abdomen, and a small bruise on her right front groin area. AJS was removed from the home the following day, March 1, 1979. Following her removal, AJS was placed in a foster home for one month, then transferred to a Special Training for Exceptional People (STEP) group home. During the period following her removal, her appearance and personal hygiene again improved, her school attendance improved markedly, and she was more alert while at school. There was also testimony that her reported seizure activity subsided and her performance in school improved. SRS filed its petition alleging AJS was a youth in need of care on June 29, 1979. The cause was heard by the District Court at multiple hearings held on September 6, 1979; December 6, 1979; April 3, 1980 and June 3, 1980. The District Court entered its findings, conclusions and order on October 31, 1980. SRS presented as witnesses, school officials, nurses and SRS personnel who testified to substantially the facts found by the Court and related above. Additional testimony was given by Dr. Monty Gustafson, a clinical psychologist, who conducted a court-ordered psychological examination of DS. Dr. Gustafson performed an extensive psychological interview of DS and administered several detailed tests, from which he concluded DS has some organic brain damage as well as a personality disorder termed "inadequate personality." He suggested these conditions greatly interfere with DS's parenting ability, and expressed his opinion that DS is unable to deal adequately with and care for AJS over the long term. Our function in reviewing dependency and neglect cases has been well defined in a number of previous decisions. Matter of LFG (1979), Mont., 598 P.2d 1125, 36 St.Rep. 1547; In Re Gore (1977), 174 Mont. 321, 570 P.2d 1110. In Gore, we stated: "This Court is mindful that the primary duty of deciding the proper custody of children is the task of the district court. As a result, all reasonable presumptions as to the correctness of the determination by the district court will be made. [Citation omitted.] Due to this presumption of correctness, the district court's findings will not be disturbed on appeal unless there is a mistake of law or a finding of fact not supported by credible evidence that would amount to a clear abuse of discretion. (Citation omitted.)" 174 Mont. at 325, 570 P.2d at 1112. We have subsequently held in Matter of JLB (1979), Mont., 594 P.2d 1127, 36 St.Rep. 896, that the court's findings must be supported by clear and convincing evidence. That burden has been sustained here. DS attacks the sufficiency of the evidence on a number of bases. However, we find clear and convincing evidence of unexplained physical injuries and inadequate concern for the cleanliness and hygiene of AJS to support the court's findings. We therefore address only those areas. A number of school officials testified of the absolute squalor of DS's household, as related above. The same witnesses provided vivid documentation of the various injuries sustained by AJS, and of her chronic hygienic problems while in the care of her mother. These same people noticed a dramatic turnabout of AJS's cleanliness and physical well-being after she had been removed from the home. DS, on the other hand, testified that her home was adequately maintained, and that AJS was kept as scrubbed as her condition would allow. DS attributed her daughter's poor school attendance and frequent exhaustion while at school to seizure activity. *221 Falls accompanying seizures were credited by DS for all the various bruises; and the burn resulted from a bath tub accident involving nearly impossible physical contortions by AJS. Where testimony is directly conflicting, we presume that the judge's findings are correct because he was present when the testimony was given and had the opportunity to observe the demeanor of the witnesses. Matter of TER (1979), Mont., 590 P.2d 1117, 36 St.Rep. 276. Here, the court chose to believe that the home was not properly maintained despite repeated efforts of SRS to provide homekeeping assistance, and that the injuries to AJS were neither adequately nor credibly explained. The court did not abuse its discretion in so finding. DS submits that since there was no direct evidence that she deliberately inflicted the injuries upon AJS, the finding of abuse and neglect was improper. Section 41-3-102, MCA, defines an abused or neglected child as "... a child whose normal physical health or welfare is harmed or threatened with harm by the acts or omissions of his parent or other person responsible for his welfare." Regardless of any actual proof that a parent intentionally inflicted injuries upon his or her child, the occurrence of serious and frequent, yet unexplained, physical injuries to the child is sufficient to properly bring the child within the statutory definition. Additionally, the statute is broad enough to include extreme and prolonged uncleanliness under the definition of neglect. JLB, supra, 594 P.2d at 1135, 36 St.Rep. at 907. DS moved in limine, relying on section 26-1-807, MCA, the psychologist-client privilege, to exclude Dr. Gustafson's testimony. The motion was denied and the evidence subsequently received. DS argues that she trusted Dr. Gustafson, expected their communications to remain confidential; and insists her expectation should be honored. We reject this argument. We instead find that there was in fact no psychologist-client relationship between Dr. Gustafson and DS. Section 26-1-807, MCA, places the relationship of psychologist and client on the same status as attorney and client. In that regard, a party is entitled to the protection accorded to privileged communication if the communications have been made to an attorney acting, for the time being, in the character of legal advisor for the purpose of securing professional advice or aid upon the subject of the client's rights and liabilities. Bernardi v. Community Hospital Association (1968), 166 Colo. 280, 443 P.2d 708, 716. Here DS did not seek out and retain Dr. Gustafson for professional help, but was ordered by the Court to undergo an evaluation. Nor were the communications between the two directed toward securing professional assistance for DS. The privilege clearly did not attach in this instance. This issue is somewhat complicated by a previous contact between DS and Dr. Gustafson in an unrelated matter. However, even assuming arguendo, that the previous contacts did establish a psychologist-client relationship, it was yet within the discretion of the District Court to consider the testimony. In proceedings of this type, the child's best interest and welfare, not those of the natural mother, are the paramount considerations. In re Bad Yellow Hair (1973), 162 Mont. 107, 509 P.2d 9. The District Court must balance the rights of the mother and the child; and while the mother's rights are important, they are not absolute. Matter of CMS (1979), Mont., 609 P.2d 240, 36 St.Rep. 2004. In some instances, the best interests of the child require some degree of flexibility in procedure to insure that all evidence pertaining to the best interests of the child may be considered. TER, supra. In applying these rules, we find this language persuasive: "in the exercise of the court's inherent power to do what is best to protect the welfare of the infant, the right of [the mother] to invoke the patient-physician privilege must yield to the paramount rights of the infant." People v. Fitzgerald (1963), 40 Misc.2d 966, 244 N.Y.S.2d 441, 442. DS next argues the admission of Dr. Gustafson's testimony violated her right to *222 individual privacy under 1972 Mont.Const., Art. II, § 10. The record indicates this argument is raised for the first time here on appeal. The District Court was presented with and decided only the question of privileged communications. DS may not now raise the issue of infringement of her right to privacy. It is well settled that a party may not change a theory to this Court from that advanced at trial court. Velte v. Allstate Ins. Co. (1979), Mont., 593 P.2d 454, 36 St.Rep. 724. See also, Johnson v. Doran (1975), 167 Mont. 501, 540 P.2d 306. DS finally submits, without citation of authority, that the District Court should be reversed for failure to handle this cause expeditiously. We agree that the interval here of 20 months between the time of removal from the home until the final order was long; and we exhort District Courts to give preference to custody cases. Section 41-3-401(2), MCA. We believe, however, that reversal here would be an ill-advised and improper sanction. We reiterate that our paramount concern is for the best interest of the child. Bad Yellow Hair, supra. Here, the court did act somewhat slowly in permanently removing AJS from an abusive environment. However, were we to replace the child in that abusive environment due to the District Court's deliberate pace, we would be negating our expressed concerns for the child's best interests. The delay does not necessitate reversal. Affirmed. HASWELL, C.J., and DALY, SHEA and HARRISON, JJ., concur.
Low
[ 0.5302325581395341, 28.5, 25.25 ]
Best Dust and Pollen Masks Year round, particles are in the air we breathe. During the spring, trees, flowers, and weeds bloom, Cooler weather brings ragweeds, goldenrods, and molds. If you are planning on going outside, you will be exposed to them. Fortunately, the ragweeds and goldenrods will be gone with the first few touches of frost. Mold can linger all winter. Regardless of the season, if you have seasonal allergies you can reduce exposure throughout the year by wearing one of these face masks while working, exercising, or just enjoying the outdoors. Mu2 Sport Mask The Mu2 Sports mask is made for the active outdoor enthusiast and military personnel. If you are into hiking, running, skiing, snowboarding, hunting, motocross, bike or ATV then you need to take a serious look at the Mu2 Sports Mask. The mask combines the same material used to make the Q-Mask in a neoprene covering that allows the mask to cover both the nose and mouth without restricting airflow. Because particles hit the "filtering" material and bounce off, it doesn't clog up and won't get hot under the mask. At the heart of the mask is a unique Micro Air Screen filtration material which repels dust and pollen particles and will not promote the growth of molds or bacteria like many other masks. The pores of the MicroAirScreen are small enough to prevent passage of the smallest allergenic pollen (about 18 microns in diameter), but are numerous enough to provide unrestricted airflow. The micropore material of the U2 mask does not get clogged. "Mu Two" is a newly patented respirator which uses the long-lasting Micro Air Screen filtration material which allows for easy breathing. Other dust and sports mask manufacture tell you that hard labored breathing is an advantage: "simulates high altitude training". Why do you want to breathe any harder than you have to? Washable and designed to be used and re-used again and again. Simply hand wash with gentle dishwashing detergent and drip dry. QMask Breathe easy with the Qmask dust and pollen mask. When you exercise your muscles need oxygen. The last thing you need is a mask that restricts your airflow and your oxygen. The revolutionary material won't clog and it won't restrict your airflow. Instead of trapping pollen and other debris, it blocks and repels them. In a nutshell, pollen hits the mask and bounces off. You breathe easy and you breathe pollen free. Wear glasses? Not a problem with the Qmask. The flexible edges conform to the contours of your nose and cheeks easily and comfortably. Your glasses or sunglasses will not fog up and the Qmask won't compete with your glasses for valuable real estate behind your ear. Instead of wide straps, the Qmask uses soft ear loops to keep your mask in place. It won't interfere with your hearing aids either! That's just the start. Unlike cheap paper style masks that you use once and throw away, the Qmask is reusable. Just rinse to remove any pollen and let it drip dry. Wear it over and over and over again. Be Cool - With all that exercise, you can work up a sweat. Be cool with the Qmask. It won't get hot no matter how strenuous your activity. Vogmask N99 No one likes wearing a dust/pollen mask, but sometimes it is just necessary. There are a lot of different masks on the market but the truth is, the prettier and thinner they are, the less effective they are. However, one company has found a way to make them look good and stay effective. The Vogmask N99 face mask not only looks good and has an excellent fit designed for comfort no matter what but it also meets NIOSH stringent filter efficiency N99 standards. The Vogmask N99 passed the inhalation/exhalation resistance, and bacterial filtering efficiency in tests by FDA certified microbiology test lab, Nelson Labs, USA. Take a quick glance at the EPA air quality website and you are bound to come across the word particulate. This basically means a small particle in the air. They are typically categorized into two sections: 2.5 and 10. The finer the particulate the worse it is for you. The Vogmask N99 is made of microfiber fabric that, if properly fit, filters out the finer 2.5 particulate matter (PM). Often other masks tend to leave gaps on the sides or at the nose, thus negating any viability of the filtration system therein. What good is the filter if the air does not pass through it? The noseband of the mask that sits on the nose is adjustable (since all nose shapes are different) so that you can press it gently to fit against your face properly. With this in place, air has one way to get in; through the filter. They have spandex trim and ear loops that hold the mask in place. The active carbon filter is derived from the coconut shell, which helps it absorb smells and contaminants. The exterior can be washed, which you probably want to do once a week if you use it heavily. Mildly rinse outer and inner layer with water, add a small drop of liquid soap (like dishwashing liquid), rinse again and hang dry. Store in a clean dry place free of dust. Do not store in a plastic bag unless fully dried.
Mid
[ 0.573113207547169, 30.375, 22.625 ]
* The displayed price after rebate shows your estimated product price after rebate. Rebate is in the form of a merchandise credit check which may only be redeemed in store. Some exclusions apply. Learn More > Required Accessories Required Accessories Description & Documents Mastercraft® flush doors offer a simple yet inexpensive option for your home. This model comes ready-to-finish and install. With its hollow core design, this door offers exceptional detail giving you the look of a genuine solid wood door at a very affordable price. Left Inswing: When pulling the door toward you, the knob is on the left side Ready-to-finish, smooth hardboard Prehung with 4-9/16" jamb prefinished in rich Country Oak Hollow core construction Two Dull Brass hinges Prebored with 2-3/4" backset for easy installation (handle set sold separately) Please Note: Prices, promotions, styles and availability may vary by store and online. While we do our best to provide accurate item availability information, we cannot guarantee in-stock status and availability as inventory is sold and received continuously throughout the day. Inventory last updated 3/3/2015 at 5:00am EST. Online orders and products purchased in-store qualify for rebate redemption. Rebates are provided in the form of a merchandise credit check which can only be used in a Menards store.
Mid
[ 0.553811659192825, 30.875, 24.875 ]
Breast cancer prognostic significance of some modified urinary nucleosides. The prognostic significance of six urinary modified nucleosides, 5-methylcytidine (5-MeCyd), 4-acetylcytidine (4-AcCyd), 1-methylinosine (1-MeIno), 1-methyladenosine (1-MeAdo), 7-methylguanosine (7-MeGua) and pseudouridine (psi-Urd) was evaluated in 68 breast cancer patients of the specialized cancer hospital of Lyon (France). Excretions of 1-MeIno and 1-MeAdo were significantly higher in patients hospitalized in the medical rather than surgical ward, reflecting more advanced disease, and also among patients who died within 5 years of follow-up as compared to those still alive. These results suggest an unfavourable prognostic significance of high urinary excretion of 1-MeIno and 1-MeAdo in breast cancer patients.
High
[ 0.6570743405275781, 34.25, 17.875 ]
[Lateral transmandibular route for deep-lobe parotid tumor excision]. The parapharyngeal space may be a site for tumors, especially for those developed in the deep parotid lobe. The surgical route to parapharyngeal space tumors is a challenge because of neighbor anatomic structures and the specific risk of mandibular nerve damage. The aim of this study was to describe an original lateral transmandibular route, setting aside the mandible angle and preserving the mandibular nerve.
High
[ 0.6866952789699571, 30, 13.6875 ]
The prior art discloses various methods of routing and clamping the cables of a robot including electrical cables and/or cables containing a fluid, such as paint. When such cables are connected to robot parts which are rotatable about a pivotal axis, the cables must be routed and/or clamped to prevent interference and rubbing between the cables and between the cables and the other robot parts. One method that has been employed is to coil the cable or cables so that the cables wind or unwind depending upon the direction of rotation. This method, however, requires additional space to allow the winding and unwinding of the coils of the cable. If such space is not provided, the coils of the cable will rub against the other moving and non-moving parts of the robot, thereby shortening the life of the cables. Also, such cables must be flexible enough to permit such winding and unwinding. The prior art discloses numerous methods of routing and clamping cables in a robot. These include the U.S. patent to Bock U.S. Pat. No. 2,811,267; the U.S. patent to Stoddard U.S. Pat. No. 2,847,663; the U.S. patent to James U.S. Pat. No. 2,861,700; the U.S. patent to Bergsland et al U.S. Pat. No. 2,861,701; the U.S. patent to Demorest et al U.S. Pat. No. 2,926,627; the U.S. patent to Sullivan U.S. Pat. No. 3,066,805; the U.S. patent to Boretti et al U.S. Pat. No. 3,477,870; the U.S. patent to Dunn U.S. Pat. No. 3,865,525; the U.S. patent to Hill U.S. Pat. No. 3,904,234; the U.S. patent to Abu-Akeel et al U.S. Pat. No. 4,218,166; the U.S. patent to Hedren et al U.S. Pat. No. 4,348,575; and the U.S. patent to Susnjara U.S. Pat. No. 4,378,959.
High
[ 0.6616915422885571, 33.25, 17 ]
A night at the ball Cinderella, played by Cassidy Dorain, dances with the Prince, played by Alexander Damian, as Stepsister Portia, played by Sarah Hansen, tries to distract them. DARNELL RENEE, FOR THE REGISTER 1 of 14 The Fairy Godmother, played by Alexandria Pisano, sprinkles magic dust over Cinderella, played by Cassidy Dorain, before she is transformed for the ball. DARNELL RENEE, FOR THE REGISTER 1 of 14 The Fairy Godmother, Alexandria Pisano, sprinkles magic dust over Cinderella, Cassidy Dorain, during the opening night of 'Cinderella' at the Gem Theater in Garden Grove. DARNELL RENEE, FOR THE REGISTER 1 of 14 The Fairy Godmother, played by Alexandria Pisano, sings as Cinderella, played by Cassidy Dorain, is taken away in the carriage to the ball. DARNELL RENEE, FOR THE REGISTER 1 of 14 An ensemble cast dances to 'Your Majesties,' on opening night of 'Cinderella' at the Gem Theater in Garden Grove. DARNELL RENEE, FOR THE REGISTER 1 of 14 Cinderella and the Prince dance at the ball during opening night of 'Cinderella' at the Gem Theater in Garden Grove. DARNELL RENEE, FOR THE REGISTER 1 of 14 The Herald, played by Alyssa Gauss, center, announces to the town in song, "The Prince is Giving a Ball." DARNELL RENEE, FOR THE REGISTER 1 of 14 Stepsister Portia, played Sarah Hansen, left, Stepsister Joy, played by Alaina Gauss, and the Stepmother, played by Grace Shackelford. DARNELL RENEE, FOR THE REGISTER 1 of 14 Cinderella's stepsisters Portia, played by Sarah Hansen, and Joy, played by Alaina Gauss, and stepmother, played by Grace Shackelford, admire her dress for the ball. DARNELL RENEE, FOR THE REGISTER 1 of 14 Cinderella, played by Cassidy Dorain, sings "A Dream is a Wish Your Heart Makes," during opening night of "Cinderella" at the Gem Theater in Garden Grove. DARNELL RENEE, FOR THE REGISTER 1 of 14 Cassidy Dorain performs the lead role during the opening night of "Cinderella" at the Gem Theater in Garden Grove. DARNELL RENEE, FOR THE REGISTER 1 of 14 Alexander Damian is the Prince during opening night of "Cinderella" at the Gem Theater in Garden Grove. DARNELL RENEE, FOR THE REGISTER 1 of 14 The Prince, played by Alexander Damian, and the Queen, played by Jordan Crowley, share the stage during opening night of "Cinderella" at the Gem Theater in Garden Grove. DARNELL RENEE, FOR THE REGISTER 1 of 14 The Prince, played by Alexander Damian, and the Queen, played by Jordan Crowley, share a scene during opening night of "Cinderella" at the Gem Theater in Garden Grove. DARNELL RENEE, FOR THE REGISTER The classic fairytale of true love, evil and wicked siblings, and a little magic came to life Nov. 7 and 8 at The Gem Theater in The Arts & Learning Conservatory's production of “Cinderella.”. The adaptation of Rodgers and Hammerstein's classic continues this weekend. The curtain rises at 7 p.m. Friday and at 1 and 7 p.m. Saturday. For more information, call 714-741-9550 or visit artsandlearning.org. User Agreement Keep it civil and stay on topic. No profanity, vulgarity, racial slurs or personal attacks. People who harass others or joke about tragedies will be blocked. By posting your comment, you agree to allow Orange County Register Communications, Inc. the right to republish your name and comment in additional Register publications without any notification or payment.
Mid
[ 0.573113207547169, 30.375, 22.625 ]
“This mostly sativa hybrid has a potent earthy pine aroma with long-lasting psychoactive effects. Despite its name, this strain is not truly a “kush,” though it does possess some indica traits and is rumored to have some kush in its legendary heritage.”
Low
[ 0.527710843373493, 27.375, 24.5 ]
"I think that's something that we'll get a chance to see over the next couple of months," Whisenhunt said. "Health would be the first thing, obviously. But I don't know really much about him. I'll get a chance over the next couple of months to sit down. We can talk about football (and) see his passion level for the game, where he is as a student of the game. And then we'll get a chance on the field to see some things, so that's all part of the process."
Mid
[ 0.627368421052631, 37.25, 22.125 ]
Arterial neutral cholesteryl esterase. A hormone-sensitive enzyme distinct from lysosomal cholesteryl esterase. We describe here an activable neutral cholesteryl esterase (EC 3.1.1.13) in arteries similar to the hormone-sensitive lipase of adipose tissue and adrenal cortex. Maximum enzyme activity in rabbit aorta was given by cholesteryl ester substrates dispersed as a mixed micelle with phosphatidylcholine and Na taurocholate (molar ratio 1:4:2). A quantitative assay of enzymic activity was obtained with the following component concentrations: 6.0 microM cholesteryl [1-14C]oleate, 23.7 microM phosphatidylcholine, 12.5 microM Na taurocholate, 0.04% serum albumin, and 85 mM K phosphate buffer, pH 7.0. The enzymic activity in aortic homogenates was stimulated 2-fold by addition of 5 microM glucagon or 100 microM dibutyryl cAMP. This activation was Mg-ATP dependent. Addition of 50 micrograms/ml of exogenous protein kinase could reverse the action of protein kinase inhibitor on dibutyryl cAMP activation of the neutral cholesteryl esterase. In addition to activation by cAMP-dependent protein kinase, the enzyme could be distinguished from the more active arterial lysosomal cholesteryl esterase by its pH 7.0 optimum, relative stability to preincubation at elevated temperatures, and exclusive localization in the cell cytosol. Subcellular fractionation of lipid-laden arterial foam cells revealed a significant portion of the neutral cholesteryl esterase bound to cytoplasmic cholesteryl ester-rich lipid droplets. Our results suggest that the breakdown of cytoplasmic cholesteryl ester droplets in arterial cells may be under hormonal regulation.
High
[ 0.7097701149425281, 30.875, 12.625 ]
When questioned about fatal police shootings of Stephon Clark and Alton Sterling, the White House said they are "not something for the federal government to weigh into."
Low
[ 0.37595907928388705, 18.375, 30.5 ]
Opinion | A day Alabamians will remember – Lee County Certain horrific events occurring during the course of our lives seem to leave etchings in our memory as a result of the emotional impact on us. Whether acts of terrorism, natural disasters or accidents such as the Challenger explosion, we remember vivid details about each day. While serving as President of the Alabama Public Service Commission, my first-hand observations of the devastation from tornadoes and the aftermath of major gas explosions have left permanent imprints on my memory. While pale in comparison to the feeling of loss felt by loved ones of the victims, I still found myself emotionally drained after seeing the immense destruction while I was in Lee County last week. This tornado that blew through a large swath of east Alabama was an F4 that packed 170 mph winds. Many did all they could to survive, but it was simply not enough. Seeing the aftermath left behind was tough, and I was humbled by how small and how helpless we can be in a severe weather event. Subscribe to APR's daily newsletter I cannot emphasize enough how much we all need to take heed and take cover every time there are weather warnings issued. Know where your safe place is, go there and cover yourself with the right materials. Flying debris during a tornado becomes deadly shrapnel. Be prepared so you can protect your family. The devastation in Lee County is real, it is heartbreaking, but as the Governor said, Alabamians are resilient. However, we can never replace the 23 precious lives lost on March 3, 2019, so let us continue to pray for these grieving families. Rebuilding the hardest hit areas started almost immediatel y, and the dedication of the people involved deserves commendation. Alabama’s first responders arrived on the scene quickly and prepared to do what they do best. First and foremost, they were tasked with the rescue and recovery of storm victims and caring for those that needed medical attention. At the same time, men and women worked tirelessly to clear debris to allow for safe travel. Utility teams completely rebuilt power lines and cell towers to allow for communication and reconstruction of demolished homes and buildings. Advertisement Lee County Sheriff Jay Jones and his department, working with ALEA, are doing an outstanding job. I am always in awe of law enforcement’s commitment to our state and our citizens. These first responders have daunting tasks in the most difficult environment, and yet it is amazing to see these teams work. They are focused, determined and get their jobs done quickly. Within 36 hours, the roads were passable, cell phones were working, and power had been restored to all that could receive power. I have been assured that Alabama Power will continue to have a presence in the area as cleanup work continues and homes are able to take power. That is their job, and my job is to ensure Alabamians have reliable utilities. Count me as imp ressed with the speed and efficiency with which they worked. To understand the severity of the damage, let me share with you what this meant in terms of power outage and damaged structures: 11,700 homes in Lee County lost power; 140 power poles were snapped in half; and 226 spans of power wire were on the ground. A large transmission structure in the middle of the small community of Marvyn was severely damaged. There were 669 Alabama Power personnel and contract crews on the ground in the county helping wherever they were needed. The negative visuals after a catastrophe stay with you; however, there are also beautiful moments in the chaos that I like to remember. In Alab ama, we can argue about politics, football and even religion, but there is one thing we all agree on: Alabamians are a close-knit family who help one another get through the tough times. It has been heartening to watch the stories of kindness develop throughout this tragedy. It was touching to see the folks in Tuscaloosa reach out to those hurting in Lee County, the home of the Auburn Tigers. Alabama is beautiful for many reasons, not just our mountains and beaches, it’s our caring people. May God bless Lee County, Alabama. This editorial was written by Twinkle Andress Cavanaugh who currently serves as President of the Alabama Public Service Commission. The positions set forth in this document are those of Twinkle Andress Cavanaugh and are not intended to reflect the official position of the Alabama Public Service Commission.
Mid
[ 0.587654320987654, 29.75, 20.875 ]
The Mystery of Shell Grotto Less than six feet beneath a residential neighborhood in the English seaside town of Margate lies a mysterious underground cavern. Nicknamed Shell Grotto, the subterranean passages wind for 70 feet and are adorned by millions of seashells. Who built the cavern and for what purpose remain a mystery. Ready to explore everything in this video for yourself? Find the best price for a flight to England and check out the best hotels in England, too! Note that if you purchase a product we recommend, Great Big Story may receive revenue. Everybody wins!
Low
[ 0.471698113207547, 31.25, 35 ]
Memorial Foundation for Children The Memorial Foundation for Children (Former names include Female Humane Association (1807–1921) Memorial Home for Girls (1921–1946) and the Memorial Foundation (1946–1962)) is a charitable organization in Richmond, Virginia that has been operating since 1807. It was one of Virginia's first charitable institutions. While it originally had an orphanage associated with it, it divested of this in the 1970s and now is solely a grant-making institution. History Founding The MFC was founded in 1807 as "Female Humane Association" by the wife of the Virginia Governor James E. Wood. According to early founding stories, a young homeless girl presented herself at the door of the governor's wife, who realized the lack of shelter for homeless children in the city. Original focus on female children: education and domestic service Eventually the society decided to focus on housing and educating needy children. Often the education provided would be accompanied by the young girls being given employment in prominent local [white] households First buildings In 1810 Major William Duval (William Pope Duval's father) offered the Association two lots to build a home and the Female Humane Association of the City of Richmond was incorporated by Act of the General Assembly of Virginia on 8 January 1811. The Association expanded and received large bequests from the Amicable Society of Richmond and the estate of Richmond Irishman Edmund Walls after Walls' death in 1841. The first building, a new orphanage building, was completed and dedicated in 1843. Name changes Over the years, the organization has changed its name based on adjusting its focus as well as the realities of other services available in Richmond. In 1921, the name changed from The Female Humane Association to become the "Memorial Home for Girls." In the 1920s and 30s The Memorial Home for Girls began specializing in the treatment of emotionally disturbed girls and boys in a residential unit and day-care treatment center. The home also worked closely with the Children's Memorial Clinic, an organization founded by Richmond residents and funded by the Community Fund of New York. in 1946 the Memorial Home for Girls was renamed the Memorial Foundation. In 1962 the Memorial Foundation changed its name to Memorial Foundation for Children to mark a clearer distinction between itself and the Memorial Clinic with which it had been partnering. Memorial Foundation for Children closed its orphanage in Richmond's Northside during the mid 1970s and devoted its mission to writing grants. References External links Category:Orphanages in the United States Category:Richmond, Virginia
High
[ 0.688741721854304, 32.5, 14.6875 ]
PICTURES: Investigators detail Narita MD-11 roll-over Japanese investigators have detailed the hard landing and roll-over sequence which destroyed a FedExBoeingMD-11 freighter at Tokyo Narita a year ago. In a progress report into the 23 March 2009 accident the Japan Transport Safety Board (JTSB) has released surveillance camera images showing that the aircraft, while landing on runway 34L, initially bounced after touching down on its main gear. It touched down a second time but bounced again, higher, then pitched down and contacted the runway with its nose-gear, then its main gear. The impact fractured the left wing, between the engine and the fuselage, and the first signs of fire erupted before the aircraft - with its right wing still intact - rolled inverted. The aircraft was consumed by fire. It had 28,000lt of fuel on board, as well as 400kg of flammable cargo, and was completely destroyed. Neither of the two pilots survived. The captain had accumulated a total of 8,132hr flight-time while the first officer had 5,248hr. In its update the JTSB shows that preceding aircraft had faced turbulent winds during the approach to Narita. A Nippon Cargo Airlines flight landing immediately before the FedEx MD-11F informed the tower that final approach conditions were "really rough", with winds "plus-minus 15kt below 1,000[ft]". Two minutes before the crash the tower controller cleared the FedEx jet to land on 34L and advised of winds from 320° at 29kt but added: "Maximum 36, minimum 17." After the MD-11F's central aural warning system called the height at 500ft, the captain stated: "Cleared to land 34L, stable." Four seconds later, the first officer commented: "Sheee." The JTSB's update does not indicate any further comment from the crew before the impacts at touchdown. It states that the aircraft landed at 166kt. As it bounced the jet's pitch reduced to level flight and the aircraft contacted the runway harder, with an impact of 2.21g. The MD-11F bounced into the air a second time, pitching to 6.7° nose-up and reaching a height of 16ft before pitching to 4.9° nose-down. The third impact registered 3.06g and resulted in serious structural wing damage in the region of the left-hand main gear. JTSB investigators have yet to reach conclusions on the crash. The broad dynamics of the accident sequence parallels that of several events in which MD-11 aircraft have rolled over after a heavy landing.
Mid
[ 0.566265060240963, 29.375, 22.5 ]
دریچه کولر در شرکت تهران دما انواع دریچه کولر در شرکت تهران دما عرضه می گردد. دریچه کولر محصولی است که اغلب در داخل منازل و شرکت های اداری و کارخانه جات مورد استفاده قرار می گیرد. دریچه کولر به منظور انتقال هوای موجود در کانال کولر به داخل محیط ها استفاده می شود. شرکت تهران دما انواع دریچه کولر را با متریال های گوناگون و در ابعاد مختلف عرضه می نماید. تهران دما از سال 1364 فروشگاه دریچه کولر را راه اندازی کرده است تا بتواند قدمی در راستای رساندن دمای مطلوب به محیط ها بردارد. در تهران دما دریچه کولر از جنس آلومینیوم،آهن و چوب تولید می شود. از دیگر محصولات تهران دما می توان به دریچه کولرهای خطی،سقفی،دمپردار،بدون دمپر و انواع دریچه کولر بازدید اشاره کرد. تهران دما خدمات پس از فروش ارائه می نماید و همچنین قیمت دریچه کولر را بسیار مناسب در نظر گرفته است. متخصصان نصب تهران دما همواره در تلاشند تا دریچه کولرهای مشتریان را برای آنان نصب نمایند. تهران دما بخش خرید اینترنتی دریچه کولر را راه اندازی کرده است تا مشتریان بتوانند به راحتی و در کوتاهترین زمان محصولات مورد نیاز خود را تهیه کنند. در این شرکت انواع دریچه کولر در طرح ها، رنگ ها و متریال های گوناگون ساخته می شود. تهران دما با توجه به نیاز مصرف کننده دریچه های کولرهای خود را طراحی و اجرا می نماید و با استفاده از ایده های جدید کارشناسان خود دریچه کولرجدید را از جنس های مختلفی همچون آهن،آلومینیوم و چوب تولید و به بازار مصرفی ارائه می نماید. انواع دریچه کولر انواع دریچه کولر در کانال سازی تهران دما تولید و به فروش می رسد. در تهران دما تمامی دریچه کولرهای جدید و به روز دنیا از جمله دریچه کولر مشبک، دریچه کولر دیواری، دریچه کولر سقفی و دریچه کولر خطی عرضه می گردد. انواع دریچه کولر که در بالا نام برده شد با استفاده از ورق های متنوعی تولید می شوند.فروشگاه اینترنتی تهران دما انواع دریچه کولر را در نوع گالوانیزه، آلومینیوم،پلاستیکی و چوبی به فروش می رساند. کاربرد هر یک از دریچه کولرها بسته به نوع محیط و کاربری آنها متغیر می باشد. همچنین در تهران دما انواع مختلفی از دریچه کولرهای چوبی خطی ثابت، خطی دمپردار، دیواری درپوش دار و انواع دریچه کولرهای چوبی زیر فن کوئلی تولید و به فروش می رسد. یکی از جدیدترین دریچه کولرهای شرکت تهران دما، دریچه کولر درپوش دار می باشد. این محصول محبوبیت ویژه ای در میان مشتریان کسب کرده است. هر یک از دریچه کولرها مزایای منحصر به فردی دارند که در بخش های بعدی توضیحاتی درباره ی هر کدام درج شده است. این مطالب به منظور سهولت مشتریان تهران دما در انتخاب محصول مورد نظرشان تهیه و ثبت شده است. علاوه بر اطلاعات متنی درج شده، انواع مختلف دریچه کولرهای تهران دما توسط تصاویر واضح و با کیفت هر یک از دریچه های تنظیم هوا قابل مشاهده می باشد. خرید اینترنتی دریچه کولر در گذشته افراد برای تهیه ی دریچه کولر می بایست به مراکز فروش فیزیکی مراجعه می کردند. اما امروزه با پیشرفت ارتباطات و اینترنت این قابلیت فراهم شده است که علاقه مندان بتوانند خرید اینترنتی دریچه کولر را به آسانی انجام دهند. شرکت تهران دما سامانه ی خرید اینترنتی دریچه کولر را برای مشتریان خود فراهم نموده است. خرید اینترنتی دریچه کولر سبب افزایش سرعت در خرید شده است و همچنین مشتریان ازطریق خرید از این روش می توانند محصولات خود را در محل کار و یا خانه ی خود دریافت کنند. با استفاده از این نوع خرید مشتریان با انجام تنها یک تماس تلفنی و دریافت مشاوره از کارشناسان دریچه کولر تهران دما، ابعاد محصول خود را ارائه می نمایند. سپس متخصصان در تهران دما پس از بررسی های لازم اقدام به ساخت دریچه کولر مورد نظر مشتریان می کنند. دریچه کولر جدید شرکت تهران دما با استفاده از متخصصین و کارشناسان خود اقدام به طراحی دریچه کولر جدید می نماید. کانال سازی تهران دما بنا به درخواست مشتریان و نیاز آنها دریچه کولر جدید تولید می کند. برخی از مشتریان علاقه مند هستند تا طرحی نو در دریچه کولر آبی ایجاد شود. به همین دلیل آنها محصول مورد نیاز خود را سفارش می دهند و تهران دما نیز در کوتاهترین زمان ممکن و با بهترین کیفیت محصول آنان را در طرح ها و رنگ های گوناگون تولید می کند. از جمله جدیدترین محصولات می توان به دریچه کولرهای خطی 30 درجه دمپردار، دریچه کولرهای خطی 90 دریچه کولرهای خطی 90 درجه و همچنین دریچه کولرهای چوبی درپوش دار اشاره نمود. دریچه های جدید علاوه بر اینکه به روزاند، زیبا و منحصر به فرد هم می باشند. دریچه کولر آبی جدید در صنعت کانال سازی کولر هر ساله دریچه کولرآبی جدید تولید و به بازار عرضه می شود. به دلیل رشد و پیشرفت صنعت ساختمان سازی تولید دریچه کولر آبی جدید نیز رو به افزایش است. ویژگی های دریچه کولر می بایست با استانداردهای روز مطابقت داشته باشد. لحاظ نکات اصولی و استاندارد در هنگام تولید دریچه کولر موجب بازدهی عالیه این محصول در محیط های مسکونی و صنعتی می شود. دریچه های آبی جدید به راحتی تنظیم می شوند، به طوری که مشتریان می توانند دما و هوای دریچه کولرهای آبی جدید را به جهت های راست و چپ و بالا و پایین محیط هدایت کنند. بدین صورت با انجام این عمل می توان دمای تمامی فضا را به صورت یک دست هماهنگ نمود. ضخامت ورق دریچه کولر ضخامت ورق دریچه کولر در تهران دما استاندارد می باشد. تهران دما برای بالا بردن کیفیت محصولات خود و نیز طول عمر مفید دریچه کولرها از ورق با ضخامت مناسب استفاده می نماید. شرکت تهران دما برای تولید دریچه کولر از ورق با ضخامت 50 بهره می برد. این ورق بسیار مقاوم و با کیفیت می باشد. ضخامت ورق تاثیر چشم گیری بر روی قیمت دریچه کولر دارد. به همین دلیل می توان گفت ورق با ضخامت 50 بهترین و مناسبترین گزینه هم از نظر کیفیت و هم از لحاظ قیمت می باشد. بهترین روش اندازه گیری ابعاد دریچه کولر در این بخش بهترین روش اندازه گیری ابعاد دریچه کولر را ارائه می دهیم. ابتدا دریچه کولرهایی که در گذشته نصب شده اند را از روی کانال کولر جدا می کنیم. سپس با استفاده از متر ابعاد داخلی و یا به اصطلاح تو در توی کانال کولر را اندازه گیری می کنیم. در آخرین مرحله ابعاد را بر روی یک قطعه کاغذ یادداشت می کنیم و به سازندگان دریچه کولر ارائه می دهیم. با استفاده ار این روش دریچه کولرهای شما به صورت استاندارد ساخته شده و به راحتی در قسمت دهانه ی کانال قرار می گیرد. به کمک این روش اندازه گیری دیگر نیازی به صرف هزینه ی اضافی برای بازدید و اندازه گیری نصب کنندگان دریچه کولر نیست. دریچه کانال دریچه کانال از همان ابتدای پیدایش کولر آبی و کانال سازی تولید شده است. هدف از ساخت دریچه کانال، در دسترس قرار دادن هدایت هوای کانال های کولر برای افراد بوده است. پس از اینکه کولر آبی تولید شد، افراد کارشناس در این حوزه اقدام به طراحی کانال سازی کولر و نیز دریچه کولر نمودند. آنها بعد از بررسی های کارشناسانه متوجه این موضوع شدند که برای انتقال هوا می بایست کانال کولر طراحی و اجرا شود. در نهایت آنها برای تنظیم جهت باد دریچه کانال کولر را تولید کردند. دریچه به دلیل رفع مشکل و بهبود عملکرد کولر آبی توانست به سرعت جایگاه مناسبی را در صنعت کانال سازی کسب کند. دریچه کولر آبی دیواری دریچه کولر آبی دیواری در ابعاد و انواع مختلفی تولید می گردد. دریچه کولر آبی با توجه به شرایط محیطی یک مکان مورد استفاده قرار می گیرد. کانال سازی تهران دما دریچه کولر آبی را در رنگ های مختلفی تولید می کند. این نوع از دریچه تنظیم هوا ظاهری بسیار زیبا دارد. دریچه کولر آبی دیواری در ساختمان ها بسیار پر کاربرد می باشد. پره های این محصول به نحوی طراحی شده است که افراد به راحتی می توانند جهت و سمت و سوی آن را تغییر دهند. بر روی این نوع از دریچه ها به منظور جلوگیری از ورود سرما در زمستان دمپر نصب می شود. از مزایای مهم دریچه کولر آبی دیواری تغییر یافتن جهت باد کولر می باشد که این موضوع موجب محبوبیت این کالا در میان مشتریان گشته است. دریچه کولر سقفی دریچه کولر سقفی اغلب در مکان های بزرگ اجرا می شود. این محصول در تالارهای مجلل،هتل ها،سالن های همایش و بسیاری از محیط های بزرگ استفاده می شود. این کالا همانطور که از نامش پیداست در سقف نصب می گردد. دمپرهای دریچه کولر سقفی به صورت ثابت طراحی شده اند. دریچه کولرهای سقفی در نوع های مختلفی تولید و مورد استفاده ی مردم قرار می گیرند. دریچه کولر خطی ثابت، دریچه کولر مشبک و یا لانه زنبوری، دریچه کولرهای چهارطرفه و دریچه کولرهای سه طرفه به منظور نصب در سقف طراحی شده اند. دریچه کولر دیواری در صنعت ‌کانال‌سازی دریچه‌کولر دیواری بسیار مورد استفاده قرار می‌گیرد. در تولید دریچه کولر دیواری بیشترین تنوع را می توان اعمال کرد. این‌ محصول به صورت گالوانیزه،آلومینیوم و چوبی ساخته می شود. دریچه کولر خطی، دریچه کولر پره شمشیری،دریچه کولر مشبک و دریچه کولر معمولی همه از نوع دریچه ی دیواری می باشند. تمامی این محصولات به صورت بدون دمپر و با دمپر ساخته می شوند. یکی از ویژگی های مثبت این محصول نصب شدن آسان آن می باشد. مشتریان هر کدام از این‌ دریچه ها را با در نظر گرفتن معیارهای خود و همچنین فضای اجرایشان انتخاب می‌کنند. شرکت تهران دما در زمانی بسیار کوتاه انواع دریچه کولر دیواری را با بهترین ‌کیفیت تولید و عرضه می نماید. دریچه کولر آهنی قیمت دریچه کولر آهنی بسیار مناسب می باشد. این کالا از ورق های آهنی موجود در بازار تولید می گردد. دریچه کولر آهنی محبوب ترین محصول در میان‌ مردم می باشد. این محصول با استفاده از دستگاه های صنعتی و همچنین به کمک‌ نیروی متخصص تولید می شود. در ابتدای پیدایش صنعت کانال سازی کولر اولین دریچه تولید شده توسط کاشناسان، از جنس ورق گالوانیزه بوده است. این نوع از دریچه ی تنظیم هوا برای جاهایی مناسب است که در آن رطوبت وجود ندارد. در برخی از شهرهای ایران به دلیل رطوبتی بودن هوای آن ها می بایست از سایر متریال های موجود استفاده نمود. دریچه کولر آلومینیومی طول عمر دریچه‌ کولر آلومینیومی خیلی زیاد می باشد. دلیل این امر استفاده ی ورق آلومینیوم در این محصول می‌باشد. دریچه کولر آلومینیومی نسبت به سایر دریچه های تنظیم هوا سبک تر می باشد زیرا فلز آلومینیوم سبک تر از سایر فلزات می باشد. مشتریان شرکت تهران دما بسته به نوع نیاز خود از دریچه کولرهای متنوع تولید شده در این شرکت استفاده می نمایند. دریچه کولر چوبی دریچه کولر چوبی محصولی بی نظیر می باشد. زیبایی و جذابیت دریچه کولر چوبی مثال زدنی است. تولید کنندگان این نوع از دریچه تنظیم هوا از متریال چوب استفاده می نمایند. دریچه های چوبی به دلیل زیبایی چشم نوازشان در محیط های مسکونی مورد استقبال قرار می گیرند. دریچه کولر پلاستیکی دریچه کولر پلاستیکی دارای مزایای ویژه ای می باشد. این محصول بسیار با کیفیت و پر کاربرد است. یکی از امتیازات دریچه کولر پلاستیکی قیمت مناسب آن نسبت به سایر دریچه کولر ها می باشد. این محصول ماندگاری و طول عمر بالایی دارد. دریچه کولر پلاستیکی در مدل های مختلفی تولید می گردد. در ادامه دو نوع پرکاربرد این محصول را به شما معرفی می نمائیم. دریچه بازدید پلاستیکی که اغلب برای پوشش تاسیسات و کنتورهای برق مورد استفاده قرار می گیرد.دریچه گرد پلاستیکی که برای تنظیم هوای مطلوب در سرویس های بهداشتی و حمام کاربرد دارد دریچه کولر گرد دریچه کولر گرد کاربرد ویژه ای دارد. دریچه کولر گرد به منظور انتقال هوای تازه از بیرون محیط ها به داخل فضا مورد استفاده قرار می گیرد. برای ایجاد هوای مطلوب در سرویس های بهداشتی، حمام ها و راه پله ها از دریچه کولر گرد استفاده می شود. این محصول به دلیل ظاهر زیبایی ای که دارد، مورد توجه مردم واقع شده است بورس فروش دریچه کولر در تهران بورس فروش دریچه کولر در تهران دما می باشد. چرا که این شرکت تمامی دریچه کولرها را در طرح ها و رنگ های متنوعی تولید و به بازار عرضه می کند. دریچه کولر محصولی است که باید با کیفیت بالایی تولید شود. تهران دما این تضمین را به مشتریان خود می دهد که دریچه کولرهای خود را با استفاده از بهترین متریال ها تولید می کند. همچنین شرکت تهران دما خدمات پس از فروش دریچه کولر را به مشتریان خود ارائه می نماید. مواد مصرفی در تولید دریچه کولر مواد مصرفی در تولید دریچه کولر انواع ورق ها می باشند. به منظور تولید دریچه کانال از ورق های گالوانیزه و ورق های آلومینیومی استفاده می شود. همچنین در هنگام رنگ آمیزی دریچه کولرها از رنگ های شیمیایی مختلفی استفاده می شود. برخی از دریچه کولر ها از چوب تهیه می شوند. این نوع از دریچه کولرها با استفاده از چوب های موجود در بازار تهیه می شوند. کیفیت دریچه کولر کیفیت دریچه کولر رابطه ی مستقیمی با نحوه ی تولید آن دارد. در شرکت تهران دما نیروهای متخصص و حرفه ای تولید دریچه کولر ها را انجام می دهند. به همین دلیل کیفیت دریچه کولر تهران دما بسیار بالا می باشد. نکته ای دیگر که بر کیفیت دریچه کانال تأثیر گذار می باشد، مواد مصرفی استفاده شده در تولید دریچه های هوا می باشد. دریچه کولر شیک شرکت تهران دما دریچه کولر شیک تولید می کند. تهران دما دریچه کولرهای سفارشی تولید می کند. مشتریان می توانند هر رنگ دریچه ای را که نیاز دارند از تهران دما درخواست کنند. به دلیل استفاده نمودن متریال های با کیفیت در تولید محصولات، شرکت تهران دما دریچه کولرهای بسیار زیبا و شیکی را تولید و به بازار عرضه می نماید. همچنین استفاده از رنگ های جذاب و دل نشین در محصولات موجب این شده است که دریچه کولرهای شیک تولید شوند. روش های تولید دریچه کولر در این قسمت به روش های تولید دریچه کولر در کارگاه های تهران دما می پردازیم. تهران دما با بهره گیری از متدهای روز دنیا اقدام به طراحی دریچه کولرهای جدید و به روز می نماید. در مرحله ی بعدی دستگاه های خط تولید دریچه کولر را خریداری می کند. در پایان با استفاده از نیروی انسانی متخصص و همچنین دستگاه های پیشرفته و به روز دریچه های تنظیم هوا را تولید و برای مصرف کنندگان آماد می نماید. اجرا و نصب دریچه کولر برای اجرا و نصب دریچه کولر نیاز به متخصص می باشد. شرکت تهران دما افراد ماهری را به منظور نصب دریچه کولر در منازل مسکونی و اداری، کارخانه ها و... استخدام نموده است. به منظور اجرای دریچه تنظیم هوا باید از دلر برقی یا شارژی، پیچ و قاب چوبی استفاده شود. متخصصان تهران دما در اسرع وقت به محل مورد نظر نصب دریچه کولر اعزام شده و با سرعت خیلی بالایی دریچه ی کانال های کولر را نصب می نمایند. دریچه کولر و نحوه ی نصب آن در این بخش به شیوه ی نصب دریچه کولر می پردازیم. در مرحله ی اول ابعاد دهانه ی کانال را به صورت طول و عرض ثبت می نمائیم. سپس اندازه ها را به سازندگان دریچه کولر اعلام می نمائیم تا محصول مورد نیاز را تولید کنند. پس از آن دور تا دور کانال کولر را با قاب چوبی پر می نمائیم. در آخر دریچه کولر را بر روی قاب چوبی پیچ می کنیم. نکته ی حائیز اهمیت در هنگام نصب توجه به تراز بودن دریچه کولر با سطح سقف می باشد. از کجا دریچه کولر بخرم؟ از کجا دریچه کولر بخرم؟ جواب این سوال بسیار ساده است. امروزه به دلیل وسعت ارتباطات، اینترنت نقش بسیار مهمی در امور زندگی هر فرد ایفا می کند. به همین جهت می توان گفت خرید اینترنتی دریچه کولر بهترین روش برای خرید و دریافت این کالا می باشد. بهترین راه برای خرید دریچه کولر مراجعه به فروشگاه های اینترنتی معتبر می باشد. شرکت تهران دما فروشگاه اینترنتی خرید دریچه کولر را برای رفاه خرید مشتریان دایر نموده است. قیمت دریچه کولر قیمت دریچه کولر با توجه به متریال آن محاسبه می شود. قیمت دریچه کولر بر اساس اینچ تعیین می شود. قیمت دریچه کولر گالوانیزه نسبت به دریچه تنظیم آلومینیومی ارزان تر می باشد. در هنگام قیمت گذاری بر روی دریچه هوا ابعاد (طول و عرض) محصول نیز تأثیر گذار است. یکی دیگر از عوامل مهمی که در زمان ارزیابی قیمت دریچه کولر مورد بررسی قرار می گیرد دستمزد متخصصین کارخانه می باشد. تهران دما محصولات خود را با بهترین کیفیت و با قیمت بسیار مناسب به بازار عرضه می کند. مهارت ساخت دریچه کولر در کارخانه ها و کارگاه های تولید دریچه کانال به نیروی انسانی با مهارت ساخت دریچه کولر نیاز می باشد. چرا که در هنگام تولید دریچه نیروی متخصص ماهر می بایست به کمک دستگاه های تولید اقدام به ساخت نمایند. در هنگام ساخت دریچه کولر رعایت نکاتی حائز اهمیت است. طول و عرض دریچه کانال، نوع دریچه کولر، رنگ دریچه تنظیم هوا و دمپر از جمله مواردی هستند که متخصصین در هنگام تولید می بایست توجه ویژه ای به آنها داشته باشند دریچه کولر دمپر دار دریچه کولر دمپردار یکی از پر کاربرد ترین دریچه های تنظیم هوا می باشد. دمپر در قسمت پایینی دریچه کولر طراحی و اجرا شده است. به کمک دمپر می توان هوا دهی دریچه کولر را تنطیم نمود. وقتی دمپر را به سمت پایین حرکت می دهیم، دیگر هیچ هوایی وارد فضا نمی شود، این ویژگی در زمان هایی که هوا سرد می شود استفاده ی بسیار زیادی دارد. دریچه کولر بازدید برای پوشش برخی از نقاط در ساختمان ها از دریچه کولر بازدید استفاده می نمایند. در جاهایی که شیر فلکه، کنتورهای برق وجود داشته باشند، برای استتار آنها از دریچه کولر بازدید استفاده کنند. دریچه کولر بازدید در طرح های متنوعی طراحی می شود و بسته به کاربری تولید و عرضه می گردد. استفاده از دمپر دریچه کولر استفاده از دمپر دریچه کولر مزایای زیادی دارد. به منظور تنظیم مسیر باد دریچه کولر و جهت دهی آن به سمت بالا و پایین می توان از دمپر استفاده نمود. همچنین برای اینکه ورود هوا از بیرون به درون را متوقف کنیم می توانیم دمپر دریچه کولر را کاملا بسته و مانع نفوذ هوا به داخل فضا شویم. این امر اغلب در فصل های سرد کاربرد دارد. افراد می توانند بسیار آسان دمپر دریچه کولر را باز و بسته نمایند. دریچه کولر با رنگ کوره ای دریچه کولر با رنگ کوره ای زیبایی بیشتری نسبت به سایر محصولات دارد. استفاده از رنگ کوره ای برای تولید دریچه کولر، سبب یکدست شدن رنگ بر روی دریچه کانال می شود. علاوه بر این رنگ کوره کیفیت بیشتری نسبت به رنگ آمیزی معمولی دارد. شرکت تهران دما تمامی محصولات دریچه کولر خود را با استفاده از کوره رنگ می کند. دریچه کولر برای تنظیم هوا دریچه کولر برای تنظیم هوا ساخته می شود. برای ایجاد دمایی مناسب در خانه ها و سایر مکان های فیزیکی از دریچه کولر برای تنظیم دما و هوا استفاده می نمایند. افراد می توانند با دریچه تنظیم هوا را به راحتی به هر جهتی که می خواهند تغییر دهند. از ویژگی های مثبت دریچه کولر جدید تعبیه نمودن دمپر می باشد. دمپر این امکان را می دهد تا با باز و بسته نمودن آن به راحتی پره های دریچه کولرها را ببندیم. دریچه کولر خطی 30 درجه دریچه کولر خطی 30 درجه از فلز آلومینیوم ساخته می شود. دریچه کولر خطی 30 درجه بسیار زیبا می باشد. از این محصول در محیط های مسکونی اغلب استفاده می شود. دریچه کولر خطی 30 درجه همانطور که از نامش پیداست به صورت 30 درجه رو به پایین ساخته می شود. برای مشتریانی که دریچه کولر و دریچه تنظیم هوای شیک و با دوام نیاز دارند، دریچه تنظیم هوای 30 درجه توصیه می شود. دریچه کولر تاسیسات دریچه کولر تاسیسات برای پوشش تاسیسات مورد استفاده قرار می گیرد. نام دیگر دریچه کولر تاسیسات دریچه بازدید می باشد. دریچه کولر تاسیسات در بیشتر ساختمان ها کاربرد دارد. به منظور جلوگیری از دسترس افراد به شیر فلکه های لوله های تاسیساتی از دریچه کولر تاسیسات استفاده می کنند. دریچه کولر چوبی درپوش دار دریچه کولر چوبی درپوش دار محصولی جدید و کاربردی می باشد. این محصول در مدل های دمپردار و بدون دمپردار در رنگ های متنوعی ساخته می شود. دریچه کولر چوبی درپوش دار نسبت به سایر دریچه ها متمایز می باشد، چرا که در این کالا درپوشی تعبیه شده است. این نوع از دریچه تنظیم هوا موجب جلوگیری از هدر رفت انرژی گرمایشی داخل محیط ها به بیرون و همچنین مانع از ورود هوای سرد در فصل زمستان به داخل مکان ها می شود. دریچه کولر چوبی ام دی اف برای لوکس و زیبا شدن بیشتر خانه ها می توان از دریچه کولر چوبی ام دی اف استفاده نمود. دریچه کولر چوبی ام دی اف مقاومت بسیار بالایی داشته به همین دلیل دریچه کولر از جنس ام دی اف در میان دریچه کولرهای چوبی از محبوبیت بسیار بالایی بر خوردار شده است. شکل ظاهری دریچه کولر مشبک شکل ظاهری دریچه کولر مشبک شبیه به لانه زنبور می باشد. این محصول به منظور مکش هوای فضا مورد استفاده می باشد. در سرویس های بهداشتی و در حمام ها برای بیرون بردن هوای نا مطلوب از دریچه کولر مشبک گرد و یا چهارگوش استفاده می شود. دریچه کولر مشبک در دو نوع دمپردار و بی دمپر تولید و روانه ی بازار می گردد. دریچه کولر فانتزی در شرکت تهران دما دریچه کولر فانتزی تولید و به فروش می رسد. این سبک از دزیچه کولرها با توجه به نیاز مشتریان تولید و پخش می گردد. دریچه کولر فانتزی سایزها و رنگ های مختلفی دارد. ظاهر این مدل از دریچه کولرها بسیار زیبا و خاص می باشد. دریچه کولر در شهرهای مختلف ایران تهران دما به تمامی نقاط ایران دریچه کولر ارسال می نماید. یکی از سوالات متداولی که مشتریان از ما می پرسند، موضوع ارسال دریچه کولر به سایر استان ها می باشد. دریچه کولر اصفهان، دریچه کولر تبریز، دریچه کولر مشهد و سایر شهرهای ایران بزرگ همگی تحت پوشش شرکت تهران دما می باشند. هزینه ی ارسال دریچه کولر به شهرهای دیگر بسیار کم می باشد. به طوری که هزینه ی ارسال از طریق باربری حداقل 5 عدد دریچه تنظیم هوا تقریبا به مبلغ بیست هزار تومان می باشد. بهترین دریچه کولر در فصل زمستان بهترین دریچه کولر در فصل زمستان دریچه کولرهای درپوش دار تهران دما می باشند. دریچه کولرهای درپوش دار تهران دما به نوعی طراحی شده اند که می توان در فصل های زمستان از نفوذ سرما به داخل محیط به صورت قطعی محافطت کرد. این محصول در دو نوع پلاستیکی و چوبی تولید می گردد. تهران دما برای مشتریانی که به زیبایی دکوراسیون داخلی منازل خود اهمیت می دهند، محصول ویژه ی دریچه کولر درپوش دار را معرفی می نماید. دریچه کولر سفارشی و ویژه شرکت تهران دما دریچه کولر سفارشی و ویژه تولید می کند. این شرکت با توجه به پیشنهادات و درخواست های مشتریانش اقدام به تولید محصولات ویژه نموده است. این محصولات از نظر کیفیت و نوع با سایر محصولات دریچه کولر تهران دما برابر هستند. بزرگ ترین تفاوت این کالاها تمایز در رنگ آن ها می باشد. مشتریان زیادی از ما درخواست دریچه کولر با رنگ دلخواهشان را دارند. به همین دلیل تصمیم گرفتیم دریچه کولر ویژه و سفارشی برای افراد تولید نمائیم. دریچه کولر چهار طرفه دریچه کولر سقفی چهار طرفه در سقف نصب می گردد. این نوع از دریچه کولر بهترین و مناسبترین محصول کاربردی برای استفاده در کانال هایی است که دهانه ی آن ها در سقف قرار دارد. همانطور که از نام آن پیداست، این دریچه کولر هوا را به صورت مساوی به چهار طرف هدایت می کند و بدین ترتیب هوای مطلوب به تمامی نقاط محیط پخش می گردد. دریچه کولر سه طرفه دریچه کولر سه طرفه کاربرد خاص خود را دارد. به طور عمده این نوع از دریچه کولر نیز در بیشتر مواقع بر روی سقف محیط ها نصب می شود. ظاهر این محصول بسیار شبیه به دریچه کولر چهار طرفه است. بر روی این مدل از دریچه تنظیم هوا سه قسمت مساوری تعبیه شده است. قسمت باقیمانده ی آن بسیار کوچک تر از سایر بخش های می باشد. کاربردهای دریچه کولر در این بخش به کاربردهای دریچه کولر می پردازیم. این محصول در مکان ها و محیط های گوناگونی مورد استفاده قرار می گیرد. عمده ی کاربرد دریچه کولر، برای رساندن هوا و دمای گرم و سرد به محیط های مسکونی و اداری می باشد. اما در برخی موارد استفاده های دیگری از دریچه تنظیم هوا می شود. به طور مثال برای پوشش دهی محفظه های تاسیساتی، پوشاندن فیوزهای برق و... از دریچه کولر بازدید استفاده می نمایند. یکی دیگر از کاربردهای محصول دریچه هوا، پوشاندن دستگاه های داکت اسپیلت، هواساز و فن کوئل های نصب شده بر روی سقف ها می باشد. که در این موارد اغلب از دریچه کولر زیر فن کوئلی و یا بازدید چفتی و قفل زیمنس دار استفاده می کنند. دریچه کولر روشنایی دریچه کولر روشنایی برای نور پردازی در محیط ها استفاده می شود. اگر به سقف های برخی از منازل مسکونی،ادارات و یا تالارهای پذیرایی توجه نمایید، این نوع از دریچه کولر را مشاده خواهید کرد. در این محصول فضایی به صورت تهی طراحی شده است تا نور لامپ بتواند از آن عبور کرده و به محیط زیبایی خاصی را جلوه دهد. پس از نصب دریچه کولر روشنایی در قسمت بالایی آن از شیشه ها و یا طلق برای رنگی نمودن نورها استفاده می شود. اگر می خواهید محیطی زیبا و جذاب را ایجاد کنید، بهترین گزینه برای این کار بهره گیری از دریچه روشنایی می باشد. دریچه کولر زیر فن کوئلی گریل دار در این متن با دریچه کولر زیر فن کوئلی گریل دار بیشتر آشنا می شوید. این محصول در محل هایی اجرا می شود که دستگاه های فن کوئل داکت اسپیلت نصب شده باشد. دریچه کولر زیر فن کوئلی گریل دار همانند سایر دریچه های زیر فن کوئلی می باشد. تنها یک تفاوت وجود دارد و آن وجود گریل در حاشیه و یا در وسط این محصول است. گریل جهت انتقال هوای دستگاه های فن کوئل و یا داکت اسپیلت می باشد. یکی دیگر از کارهایی که دریچه کولر گریل دار انجام می دهد، مکش هوای داخل محیط ها به بیرون از خانه می باشد. دریچه کولر قفل زیمنس دار یکی از محبوب ترین محصولات تهران دما دریچه کولر قفل زیمنس دار می باشد. ققل زیمنس بر روی دریچه کولرهای بازدید، بازدید زیر فن کوئلی و بازدید تاسیساتی تعبیه می گردد. وقتی قفل زیمنس بر روی دریچه کولرها نصب می شود، دسترسی به درون دریچه ها فقط برای فردی مقدور است که کلید قفل را دارد. شرکت تهران دما به همراه محصولات ارسالی به مشتریان، کلید قفل را به آن ها ارائه می نماید. یکی دیگر از نکات مثبتی که می توان به آن اشاره کرد، زیبایی و شیک بودن دریچه کولرهای قفل زیمنس دار است. بهترین نوع دریچه کولر آبی بهترین نوع دریچه کولر آبی بستگی به سلیقه ی افراد تعیین می گردد. برای بعضی از مشتریان دریچه کولر دیواری دمپردار معمولی بهترین گزینه می باشد. برای برخی دیگر بهترین گزینه دریچه کولر آبی خطی 30 درجه دمپردار است. این بدان معناست که هر شخص با توجه به معیارهای خود، سلیقه ی خود و نیز محیط کاربری خود اقدام به انتخاب دریچه کولر آبی مورد نظر خود می نماید. شرکت تهران دما تولیدات متنوعی را ارائه می نماید به همین دلیل مشتریانی که از تهران دما دریچه کولر آبی تهیه می کنند، حق انتخاب زیادی دارند. دریچه کولر آبی آلومینیومی یکی از محصولات پر فروش در بازار دریچه کولر آبی آلومینیومی می باشد. این محصول به دلیل کیفیت متریالی که دارد، جایگاه منحصر به فردی را در میان مردم کسب کرده است. دریچه کولر آبی آلومینیومی به دلیل جنس با کیفیت خود، ماندگاری و طول عمر بسیار بالایی دارد. یکی دیگر از وجه تمایزهای این نوع از دریچه کولر، قابلیت شست و شوی آن می باشد. مشتریان اغلب علاقه مند به این هستند که دریچه های تنظیم هوای خود را شست و شو دهند، دریچه هوای آبی آلومینیومی این امکان را برای مشتریان فراهم نموده است. نحوه ی ارسال دریچه کولر به سایر شهرها در این بخش به چگونگی نحوه ی ارسال دریچه کولر به سایر شهرهامی پردازیم. در مرحله ی اول شرکت تهران دما سفارش دریچه کولر مشتریان خود را از دیگر شهرها ثبت می نماید. پس از تولید محصولات، تهران دما دریچه کولرها را با استفاده از پلاستیک های مخصوص، بسته بندی می نماید. بسته بندی محصولات به این جهت انجام می شود که دریچه کولرها هنگام بارگیری و در مسیر آسیبی به آنها وارد نشود. پس از این مرحله عوامل تدارکات تهران دما محصولات را به یکی از باربری های معتبر ارسال می کنند. در پایان دریچه کولرها پس از دو روز کاری به دست مشتریان می رسد. دریچه کولر پره شمشیری چیست؟ دریچه کولر پره شمشیری با سایر محصولات برابر است. این نوع از دریچه کولر در دو مدل دمپر دار و بی دمپر ساخته می شود. افراد می توانند مسیر باد را توسط دریچه کولر پره شمشیری به سمت چپ و یا راست و بالا و پایین هدایت کنند. تنها تفاوت این نوع دریچه کولر با سایر تولیدات، شمشیری بودن پره ها می باشد. پره های این محصول باریک می باشد، به همین دلیل زیبایی آن دو چندان شده است. دریچه هوای دکوری زیبا شرکت تهران دما دریچه هوای دکوری زیبا را به سفارش مشتریانش تولید می کند. تهران دما محصول جدید و زیبایی را به بازار عرضه نموده است. این محصول زیبایی چشم نوازی را در منازل مسکونی و مکان های اداری به وجود می آورد. محصولی که در بالا درباره ی آن مطلب خواندید، دریچه کولرهای چوبی از جنس ام دی اف شرکت تهران دما می باشد. دریچه کولرهای چوبی تهران دما در رنگ های متفاوتی تولید می شوند. علاوه بر زیبایی، می توان به کیفیت و طول عمر این محصول اشاره نمود. دریچه کولر تزئینی و دکوری شرکت تهران دما دریچه کولر تزئینی و دکوری تولید و عرضه می کند. در کارگاه تهران دما با استفاده از طرح ها و ایده های متخصصین، دریچه کولرهای تزئینی زیبا و جذابی تولید می گردد. کاربرد هر یک از دریچه کولرهای تزئینی علاوه بر تنظیم دما و جهت باد، زیبا نمودن محیط و دکوراسیون داخلی می شود. تهران دما این محصول را با توجه به سایز و اندازه های دلخواه مشتریان خود تولید می نماید. زمان مورد نیاز برای تولید دریچه کولر زمان مورد نیاز برای تولید دریچه کولر با توجه به عوامل مختلفی متفاوت می باشد. نوع و مدل و رنگ در زمان ساخت دریچه کولر تآثیر گذار است. به طوری مثال دریچه کولرهای فلزی در 4 الی 5 روز کاری تولید می شوند اما زمان تولید دریچه های چوبی بیشتر می باشد. دریچه های جوبی در 7 روز کاری ساخته می شوند. دریچه های رنگی فلزی زمان ساختشان 2 روز بیشتر از سایر محصولات زمان نیاز دارد. تفاوت دریچه کولر گالوانیزه و آلومینیوم در این بخش تفاوت دریچه کولر گالوانیزه و آلومینیوم را بررسی می کنیم. دریچه کولر گالوانیزه از ورق گالوانیزه و دریچه کولر آلومینیومی از ورق آلومینیومی تولید و تهیه می شوند. دریچه کولر گالوانیزه وزن بیشتری نسبت به دریچه کولر آلومینیومی دارد. دریچه کولر آلومینیومی قابل شست و شو بوده و در مقابل زنگ زدگی بسیار مقاوم است. دریچه کولر گالوانیزه ارزانتر از دریچه کولر آلومینیومی می باشد. ممانعت از ورود حشرات از درون دریچه کولر حشرات می توانند به راحتی از درون دریچه کولر به درون محیط های مسکونی و اداری نفوذ کنند. کارشناسان شرکت تهران دما راه کار خوبی را برای ممانعت از ورود حشرات از دورن دریچه کولر به محیط ها طراحی کرده اند. برای انجام این کار لازم است مقداری توری پارچه ای تهیه شود. پس از آن به اندازه طول و عرض داحلی کانال کولر توری را برش می زنیم. سپس تور را قبل از اینکه دریچه کولرمان را نصب کنیم به داخل کانال کولر با استفاده از چسب مخصوص می چسبانیم. بعد از اینکه توری کاملا چسبید دریچه کولر را در جای خود نصب می کنیم. پس از این دیگر هیچ حشره ای به درون محیط زندگی و کار ما ورود نخواهد کرد. تاریخ تعویض دریچه کولر تاریخ تعویض دریچه کولر به عوامل مختلفی بستگی دارد. برخی از مردم هر چند سال یکبار در دکوراسیون داخلی منازل و محیط کار خود تغییر ایجاد می کنند. به همین خاطر در حین تغییر مبلمان و یا نقاشی دیوارها، دریچه کولرهای محیط خود را نیز تعویض می کنند. اما به طور طبیعی و میانگین بهتر است هر 10 سال یکبار دریچه کولرها را تعویض نمائیم. شرکت تهران دما برای تعویض بازسازی دریچه هوای منازل و ادارات و سایر موارد، پیشنهادهای بسیار خوبی را به مشتریان خود ارائه دهد. انتخاب بهترین دریچه کولر کارشناسان فروش شرکت تهران دما شما را در انتخاب بهترین دریچه کولر برای محیط کاربری تان راهنمایی می کنند. مشتریان تهران دما با برقراری تماس با کارشناسان این شرکت به راحتی می توانند به صورت رایگان مشاوره دریافت کنند. افراد می توانند تمامی انتظارات، سلایق و دیگر نکات را به کارشناسان دریچه کولر تهران دما ارائه نمایند. در پایان مدیران فروش تهران دما پس از بررسی درخواست مشتریان بهترین نوع دریچه کولری که نیاز آن ها را تامین کند، به آن ها معرفی می کنند. دریچه کولر مکنده دریچه کولر مکنده برای خروج هوای نامطلوب در ساختمان ها طراحی شده است. این محصول در محیط های مختلفی کاربرد دارد. از جمله مکان هایی که دریچه کولر مکنده اجرا می گردد، رستوران ها، تالار های پذیرایی، سالن های همایش، سالن های نمایش تاتر و سینما و در برخی موارد در منازل مسکونی استفاده می شود. دریچه کولر مشبک، دریچه کولر سقفی چهار طرفه، دریچه کولر زیر فن کوئلی گریل دار همگی به منظور مکش هوای نا مطلوب در محیط ها اجرا می شوند. دریچه کولر دمنده یا دهش دریچه کولر دمنده یا دهش هوای مطلوب دستگاه های تهویه را به داخل محیط هدایت می کنند. این محصول عملیات به نوعی دهنده ی هوا و دمای مطلوب به داخل محیط های مسکونی و تجاری مختلف می باشد. دریچه کولرهای متنوعی کاربری دهش و دمنده را دارند. دریچه کولر آبی دیواری، دریچه هوای سقفی چهار طرفه، دریچه هوای سقفی سه طرفه، دریچه ی خطی 30 درجه، دریچه ی خطی 90 درجه و دریچه ی پره شمشیری را می توان به عنوان دریچه ی تنظیم هوای دمنده به کار برد. رنگ بندی دریچه کولرهای تهران دما رنگ بندی دریچه کولرهای تهران دما بسیار زیاد است. تا کنون متشریان زیادی درخواست دریچه کولرهای رنگی دلخواهشان را از شرکت تهران دما خوستار شده اند. شما می توانید رنگ دلخواه و مورد نظرتان را به صورت عکس برای کارشناسان فروش این شرکت ارسال کنید. پس از بررسی های لازم در قسمت خط تولید، کارکنان کد رنگ مورد نظر را بر روی دریچه کولر مشتریان اعمال می کنند. کاربرد جای پیچ دریچه کولر چیست؟ کاربرد جای پیچ دریچه کولر چیست؟ جای پیچ دریچه کولرها برای استفاده در هنگام نصب طراحی شده اند. پیچ ها نگهدارنده ی دریچه کولر بر روی دهانه ی کانال کولر هستند. پیچ ها درون جای پیچ دریچه هوا قرار گرفته و درون چهارچوب ها درج می شوند. تعداد جای پیچ ها برای دریچه کولرهای آبی دیواری 2 عدد می باشد. همچنین تعداد پیچ ها در دریچه های بزرگی مانند زیر فن کوئلی بیشتر می باشد. اندازه ی قاب دریچه کولر اندازه ی قاب دریچه کولر در هر یک از متریال ها و مدل ها متفاوت است. اندازه ی قاب دریچه های معمولی فلزی 4 سانتی متر می باشد. در برخی از مدل های دریچه کولر اندازه ی قاب بزرگ بوده و در بعضی دیگر ابعاد کوچک می باشد. جای پیچ دریچه کولر و دمپر بر روی این قاب ها نصب می گردد. دریچه کولر برقی دریچه کولر برقی طرفداران بسیار اندکی دارد. این مدل از دریچه های تنظیم هوا به وسیله ی کنترل از راه دور تنظیم می شوند. به وسیله ی دکمه هایی که بر روی دریچه کولر برقی قرار گرفته است می توان دمپرها را باز و بسته و نیز به چپ و راست هدایت نمود. این محصول به وسیله ی باطری کار می کند. همانطور که در بخش ابتدایی این متن اشاره شد، دریچه ی برقی مشتریان کمی را نسبت به دریچه کولرهای فلزی و چوبی دارد. شابلون در دریچه سازی کولر استفاده از شابلون در دریچه سازی کولر امری ضروری است. در حقیقت شابلون ها برای تولید انبوه محصولات متنوع مورد استفاده قرار می گیرند. در صنعت کانال سازی و هم در کارخانه جات دریچه کولر سازی از انواع گوناگونی از شابلون ها برای سرعت بخشیدن به خط تولید استفاده می گردد. با به کارگیری این ابزا در ساخت دریچه های تنظیم هوا دیگر نیازی نیست افراد متخصص برای برش ورق هر کدام از محصولات آن ها را اندازه گیری نمایند. بسته بندی دریچه کولر تهران دما بسته بندی دریچه کولر تهران دما اصولی و مناسب می باشد. پس از تحقیقات و دریافت انتقادات و پیشنهادات، مدیر عامل شرکت تهران دما تصمیم بر این گرفت تا دریچه کولرهای این شرکت را با در بسته بندی ها مرتب به دست مشتریان برساند. بسته بندی محصولات دریچه کولر موجب جلوگیری از آسیب رسیدن به محصولات در حین باربری و ارسال شده است. پس از اتمام مراحل تولید دریچه ی هوا با استفاده از پلاستیک های مخصوص محصولات را بسته بندی می نمایند. قیمت دریچه کولر طرح چوب قیمت دریچه کولر طرح چوب با توجه به ابعاد (طول و عرض) دریچه محاسبه می شود. قیمت ورق ام دی اف خریداری شده بر روی مبلغ دریچه های چوبی تأثیر گذار می باشد. همچنین به دلیل اعمال ظرافت های جزئی در هنگام تولید دریچه کولر چوبی قیمت این محصول نسبت به سایر محصولات بیشتر می باشد. دریچه هوای طرح چوب بسیار زیبا بوده و تهران دما تمامی رنگ هایی را که مشتریان بخواهند برایشان تولید می کند. دریچه کولر آهنی خطی دریچه کولر آهنی خطی نیز در تهران دما عرضه می گردد. شرکت تهران دما پیش از این دریچه کولر خطی را با استفاده از متریال آلومینیومی تولید می کرد. اما با گذشت زمان با توجه به نیاز بازار اقدام به ساخت و تولید دریچه کولر از ورق آهن (گالوانیزه) نمود. تهران دما دریچه کولر آهنی خطی را در انواع مختلفی از رنگ ها روانه ی بازار می کند. دریچه زیر فن کوئلی دسترسی بهترین گزینه به منظور پوشاندن دستگاه های سرمایشی و گرمایشی دریچه کولر زیر فن کوئلی دسترسی می باشد. این سبک دریچه کولر همچون کمد قابلیت باز و بسته شدن دارد. به همین دلیل در زمان هایی که دستگاه هایی همچون چیلر، فن کوئل، داکت اسپیلت و... نیاز به تعمیر و یا سرویس دارند، بهترین محصول کاربردی، دریچه کولر زیر فن کوئلی دسترسی می باشد. دریچه کولر خطی 90 درجه دریچه کولر خطی 90 درجه هوا را به رو به رو هدایت می کند. کاربرد این دریچه کولر در زمان هایی است که از دستگاه های داکت اسپیلت و زیر فن کوئلی استفاده می گردد. همانطور که می دانید دریچه کولر خطی 90 درجه به صورت ثابت بوده و پره های آن قابل تنظیم نمی باشد. این محصول زیبا و با دوام می باشد، به همین خاطر افراد جذب آن می شوند. جلوگیری از ورود هوای سرد از دریچه کولر شرکت تهران دما برای جلوگیری از ورود هوای سرد از دریچه کولر به محیط ها ارائه ی راهکار نموده است. افراد در محیط ها به منظور انجام اینکار می بایست ابتدا دمپر روی دریچه کولر را کاملا ببندند. حدود 80 درصد از ورود هوا با اینکار متوقف می شود. برای جلوگیری از ورود هوای 20 درصد باقیمانده روی دریچه کولرها را با مقوا و درپوش مخصوص می بندیم. بدین ترتیب دیگر هیچ هوایی به درون محیط مان نفوذ نخواهد کرد. ثبت سفارش دریچه کولر جهت ثبت سفارش دریچه کولر ابتدا با کارشناسان فروش شرکت تهران دما تماس بگیرید. پس از اینکه ابعاد و نوع دریچه کولر خود را انتخاب کرده و به کارشناسان فروش انتقال دادید. پیش فاکتور محصول برای شما ارسال می گردد. در پایان بعد از تأیید نهایی محصول دریچه کولر واریزی را به صورت اینترنتی به شماره حساب مورد نظر ارسال می نمائید. ارسال دریچه کولر با اسنپ شرکت تهران دما ارسال دریچه کولر با اسنپ را برای مشتریان انجام می دهد. اجرای این طرح سبب کم شدن هزینه های مشتریان شده است. وقتی دریچه کولر را با اسنپ ارسال می کنیم، دیگر نیازی نیست مشتریان به صورت فیزیکی و حضوری به فروشگاه تهران دما مراجعه نمایند.این کار در هنگام خرید دریچه کولر موجب صرفه جویی در زمان و هزینه ی افراد می شود. عرضه ی دریچه کولر به صورت تک و عمده شرکت تهران دما آرکا دریچه کولرهای خود را به صورت تک و عمده عرضه می نماید. برخی از مشتریان نیاز به تعویض دریچه کولر های منازل خود دارند. تهران دما آماده ی ساخت و ارائه ی دریچه کولرهای سفارشی مشتریان بر اساس نیاز آن ها می باشد. همچنین تهران دما به صورت عمده دریچه کولر های خود را به کارفرمایان و انبوه سازان بزرگ کشوری ارائه می نماید. صادرات دریچه کولر به عراق شرکت تهران دما صادرات دریچه کولر به عراق را اجرایی کرده است. تهران دما با توجه به نیاز اقدام به تولید و صادرات انواع دریچه کولرهای تنظیم هوا به کشورهای همسایه نموده است. هدف از اجرای این طرح تامین محصولات مورد نیاز کشورهای حاشیه ای و البته رشد و توسعه ی شرکت تهران دما می باشد. مدیر عامل شرکت تهران دما در سال گذشته انواع مختلفی از دریچه کولرهای پلاستیکی را به کشور عراق صادر نموده است. خرید دریچه کولر به صورت اینترنتی خرید دریچه کولر به صورت اینترنتی سبب افزایش سرعت و لذت در خرید افراد می شود. با استفاده از این روش دیگر نیازی به صرف هزینه برای بازدید و کارشناسی دریچه کولر نیست. مشتریان می توانند در هنگام خرید دریچه کولر اینترنتی مشاوره ی رایگان کارشناسان شرکت تهران دما را دریافت نمایند. پس از دریافت مشاوره کارشناسان فروش تهران دما ابعاد را از مشتریان گرفته و سپس دریچه کولر آنها را ثبت می کنند. اجرای دریچه کولر در شرکت های برجسته شرکت تهران دما اجرای دریچه کولر در شرکت های برجسته را در سال های اخیر ارائه نموده است. شرکت تهران دما انواع مختلقی از دریچه کولر را در کارخانه جات و شرکت های مشهور نصب نموده است. یکی از مکان هایی که شرکت تهران دما محصولات خود را عرضه نموده است، شرکت لبینات کاله می باشد. مدیریت شرکت تهران دما همواره در تلاش است تا خدمات با کیفیتی را به مشتریان خود ارائه نماید. دریچه کولر اسلوت چه کاربردی دارد؟ دریچه کولر اسلوت چه کاربردی دارد؟ این محصول مورد توجه افراد زیادی قرار گرفته است. دریچه کولر اسلوت به دلیل پره های ثابت و همچنین فاصله ی زیاد هر یک از پره ها از یکدیگر، هوا را به صورت یکنواخت و یکدست به درون محیط ها هدایت می کند. از این رو می توان گفت کاربرد دریچه کولر اسلوت در مکان هایی است که ما نیاز به ایجاد هوای یکدست داریم. دریچه کولر زیر فن کوئل یک تکه دریچه کولر زیر فن کوئل یک تکه در ابعاد خاصی تولید و اجرا می شود. معمولا دریچه کولر زیر فن کوئل یک تکه یا به اصطلاح عام یک دره در ابعاد کوچک فقط قابلیت اجرا دارد. در ابعاد بزرگ تر می بایست برای دریچه کولر زیر فن کوئلی دو درب تعبیه نمود که به آن دریچه کولر زیر فن کوئل دو تیکه یا دو دره می گویند. دریچه کولر گرد هواکش دریچه کولر گرد هواکش اغلب در ساختمان ها استفاده می شود. از این نوع دریچه کولر به عنوان مکش در ساختمان ها استفاده می گردد.برای تخلیه ی هوای نا مطلوب راه پله ها،حمام ها و سرویس های بهداشتی از دریچه کولر گرد استفاده می شود. دریچه کولر گرد هواکش در بیشتر مواقع به صورت مشبک تولید می شود. به منظور نصب این نوع دریچه ی تنظیم هوا از فنرهای مخصوص بهره می گیریم. دریچه کولر گرد بلندگویی از دریچه کولر گرد بلندگویی می توان هم به عنوان دهش و هم به عنوان مکش استفاده نمود. این مدل از دریچه کولر طرفداران زیادی دارد. به دلیل شکل خاص و زیبایی ظاهری ای که دارد، بیشتر مشتریان این نوع از دریچه کولر گرد را انتخاب می کنند. دریچه کولر گرد بلندگویی همانطور که از نامش پیداست ظاهری شبیه به بلندگو دارد. جهت نصب این محصول از فنرهای مخصوصی که در پشت دریچه نصب می شود، استفاده می کنند. ویژگی های دریچه کولر چوبی در این سظر به ویژگی های دریچه کولر چوبی می پردازیم. دریچه کولر چوبی با استفاده از متریال چوب تولید می گردد. برای ساخت این محصول از ام دی اف چوبی بهره برداری می شود. دریچه کولر چوبی در دو مدل قابل تنظیم دمپرداره و بدون دمپر عرضه می گردد. یکی از ویژگی های برجسته ی دریچه کولر چوبی تنوع رنگ این محصول می باشد. این محصول در رنگ های قهوه ای سوخته، کرم قهوه ای،سفید، مشکی، آجری و شکلاتی تولید و روانه ی بازار می شود. ساخت دریچه کولر چوبی رنگی ساخت دریچه کولر چوبی رنگی در تهران دما پذیرفته می شود. شرکت تهران دما آرکا با در نظر گرفتن عایق مشتریان اقدام به تولید و پخش دریچه کولر چوبی در رنگ های تیره و روشن نموده است. تهران دما 10 رنگ متنوع دریچه کولر چوبی عرضه می نماید. این محصولات در دو نوع مات و براق در رنگ های دلخواه مشتریان تولید می شود. دریچه کولر روشنایی سقفی دریچه کولر روشنایی سقفی زیر مجموعه ی دریچه های دکوراتیو می باشد. از محصول دریچه کولر روشنایی سقفی به منظور نوردهی در فضاهای مسکونی استفاده می گردد. این محصول در دو نوع ساده و بعلاوه تولید و عرضه می شوذ. در ساختمان ها پس از نصب دریچه کولر روشنایی یک عدد طلق و یا شیشه در پشت دریچه قرار می گیرد. همچنین در محلی که در سقف وجود دارد از نورهای مصنوعی برای نوردهی به محیط استفاده می کنند. استفاده از دریچه کولر روشنایی سبب یکدست شدن نور در محیط ها می شود. استفاده از دریچه کولر اسلوت استفاده از دریچه کولر اسلوت در سقف بسیار رایج است. جهت مکش و دهش هوا از این نوع کالا می توان بهره برد. دریچه کولر اسلوت با توجه به شکلی که دارد،در هنگام هوادهی، هوا را به صورت یکجا در محیط انتقال می دهد. یکدست شدن هوا در فضاها یکی از عوامل مهمی است که در ایجاد دمایی مطلوب نقش بسزایی دارد. دریچه کولر های اسلوت طاهری شبیه به دریچه کولر خطی 90 درجه دارند. دریچه کولر مربع شکل دریچه کولر مربع شکل دو دو نوع سقفی و دیواری تولید می شود. بیشترین کاربرد دریچه کولر مربع شکل در سقف می باشد. اغلب دریچه کولرهای سقفی 4 طرفه و مشبک به صورت مربع شکل ارائه می شوند. این محصول به طور میانگین در بیشتر مواقع در تالارهای پذیرایی، رستوران ها، هتل ها، سینماها، سالن های همایش و تاتر و در فضاهای اداری استفاده می گردد. در 90 درصد از مکان هایی که در بالا نام برده شد، معمولا دریچه کولر سقفی 4 طرفه اجرا می شود. دریچه کولر درپوش دار پلاستیکی دریچه کولر درپوش دار پلاستیکی علاقه مندان زیادی در سراسر ایران دارد. این محصول در فصل زمستان با توجه به ویژگی ای که دارد مانع نفوذ سرما به داخل محیط می شود. دریچه کولر پلاستیکی در دو نوع بی دمپر و دمپردار تولید و عرضه می گردد. در فصل گرما درپوش های دریچه کولر پلاستیکی را می توان به راحتی جدا نمود و در فصل سرما مجدد آنها را بر روی قاب قرار داد. این محصول به دلیل مزایای ویژه ای که دارد، در کشورهای همسایه طرفداران بسیار زیادی دارد. دریچه کولر تنظیم هوای خطی دریچه کولر تنظیم هوای خطی استفاده های گوناگونی دارد. این محصول در 3 نوع خطی 30 درجه، خطی 90 درجه و خطی 45 درجه تولید و روانه ی بازارهای مصرفی می شود. همچنین دریچه کولر خطی در مدل های دمپردار و بی دمپر ساخته می شود. در 99 درصد از ساختمان هایی که دستگاه های زیرفن کوئل و داکت اسپیلت اجرا شده است، از دریچه کولرهای خطی به منظور هوا دهی استفاده می گردد. بسته بندی دریچه کولر بسته بندی دریچه کولر بسیار حائز اهمیت است. بسته بندی کردن محصولات مزایای زیادی دارد. جلوگیری از آسیب دیدن محصول دریچه کولر، اعم از خردگی، رنگ پریدگی، خم شدن و... با استفاده از بسته بندی مناسب و با کیفیت امری دست یافتنی است. شرکت تهران دما آرکا با توجه به ارسال محصولات خود به تمامی نقاط کشور ایران، در نظر گرفته است، بسته بندی محصولات سایر شهرها را به صورت ویژه و ضخیم اعمال نماید. به کمک این کار دریچه کولرهای ارسالی به شهرها را در برابر خطرات ایمن می کنیم. دریچه کولر دایره شکل دریچه کولر دایره شکل اغلب جهت تخلیه ی هوای نا مطلوب مورد استفاده قرار می گیرد. از دریچه کولر دایره ای در جاهایی نظیر راه پله ها، سرویس های بهداشتی، حمام، آشپزخانه، تراس و... استفاده می نمایند. در اکثریت جاهایی که محصول دریچه کولر دایره شکل مورد استفاده قرار می گیرد، محیط های مسکونی و اداری می باشند. در برخی از کارخانه جات نیز این نوع دریچه کولر اجرا می گردد، نام این نوع دریچه ی سانتیریفیوژ می باشد. 353
Mid
[ 0.546599496221662, 27.125, 22.5 ]
Q: Loop JPA array without triggering Lob fetch If have defined the following Spring JPA Entities: @Entity class Album( @Id val id: Long = 0, ... @OneToMany(mappedBy = "album") val mediaItems: Set<Media>) : Serializable @Entity @Table(name = "media") class Media( @Id @GeneratedValue(strategy = GenerationType.IDENTITY) @Column(columnDefinition = "serial") var id: Long? = null, @Column @Lob var content: ByteArray The definition includes a lazy fetched @Lob column, which actually is lazy since the underlaying database use Postgres large objects. My spring jpa is backed by hibernate. When looping through the mediaItems spring jpa entries all entries automatically fetch their associated @Lob content without even touching the content column. This Lob output is not needed for the current serialization and slows down the loop tremendously. Here is my loop: val albumProtocs = MediaProtocs.AlbumList.newBuilder().addAllAlbum( ownAlbum.map { album -> MediaProtocs.Album.newBuilder() .setId(album.id) .setName(album.name) .addAllMedia(album.mediaItems.map { media -> MediaProtocs.Media.newBuilder().setId(media.id as Long) .setDescription(media.description) .setMimeType(media.mimetype).build() }).build() }).build() A: Hibernate load all lazy fields, if you call any method of entity object, except getters. You just need to find which method is called. You can try to load the list of media directly without the album. Also you can try to load a list of media to list of DTO using projections.
Mid
[ 0.5432595573440641, 33.75, 28.375 ]
Ottawa police are trying to find a driver who backed into an elderly woman on Ogilvie Road then left her there with serious injuries. It happened in the 2300 block of Ogilvie Road, near Colonel By Secondary School off Montreal Road, just before 1 p.m. on Thursday, Dec. 8. A black SUV backed out of a residential driveway and struck an 87-year-old woman who was walking on the sidewalk, Ottawa police said in a media release issued Wednesday. The driver then left the scene. Paramedics took the woman to hospital with serious injuries, and she remains in hospital in critical condition, police said. Anyone with information is asked to call the Ottawa police collisions investigation unit at 613-236-1222. ext. 2481. Anonymous tips can be submitted by calling Crime Stoppers toll-free at 1-800-222-8477 (TIPS).
Mid
[ 0.5483870967741931, 38.25, 31.5 ]
Q: Assign domain to IP address How do i go about making my Java app run an HTTP server on some socket (e.g 172.16.1.10:8080) and make it so that when another computer on the network connects to a domain (e.g http://myjavadomain.com) it gets redirected to the socket? A: If you want to run a fully fledged HTTP server then you will probably want to use some external library. For instance, Tomcat is written in Java, but there is also SUN's httpserver package. If it's just a simple socket server you're after, you can use the built-in classes from the java.net package: ServerSocket server = new ServerSocket(8080); while (running) { Socket socket = server.accept(); handleConnection(socket); } This will listen for incoming socket connections on port 8080 and create a new Socket whenever a client connects. You can then communicate with the client through the Socket's InputStream and OuputStream, which you would probably do in a separate Thread, so that your ServerSocket can continue listening for incoming connections from other clients. As for the second part of your question: by default, a web browser will connect to port 80, and there are several ways you could do port forwarding. One possible solution using iptables is given on this website: iptables -t nat -I PREROUTING --src 0/0 --dst 172.16.1.10 -p tcp --dport 80 -j REDIRECT --to-ports 8080 But the easiest solution would be to just specify the port number directly when connecting to your machine, e.g. http://myjavadomain.com:8080 This is assuming that your DNS is configured so that it resolves myjavadomain.com to 172.16.1.10 already.
Mid
[ 0.641255605381165, 35.75, 20 ]
COVID-19 and Re-Entry & Resiliency Plan This page was last updated 07/09/2020 On June 5, Governor Wolf and the State Department of Education issued “Pennsylvania’s Re-Opening and Recovery Plan Guidance for Higher Education.” Utilizing this guide, Carlow University on June 19 published our “Re-Entry and Resiliency Plan,” a roadmap for continuing our mission as an educational institution while providing for the health and safety of our community. Our plan is framed within “The Common Good,” which recognizes our essential dependence on one another and the critical need for all of us to think beyond ourselves to act in everyone’s best interests. This is essential to the successful implementation of our plan. President Suzanne K. Mellon has convened a COVID-19 Re-Entry and Resiliency Implementation Team, which is leading the full implementation of this plan.
High
[ 0.6726862302483071, 37.25, 18.125 ]
A Pilot Evaluation of the Toxicity of EarthTec® QZ on Invasive (Bithynia tentaculata) and Native (Physa gyrina) Snail Species from the Upper Mississippi River. We used a comparative approach to investigate the effects of a copper-based pesticide (EarthTec® QZ) on embryos of an invasive snail (Bithynia tentaculata) and a native snail (Physa gyrina). Embryos were exposed to one of three treatments: control (0 mg/L Cu2+), low-dose (0.1 mg/L Cu2+), or high-dose (0.6 mg/L Cu2+), which reflect manufacturer-recommended low and medium 4-day molluscicide treatment concentrations. Exposure to 0.6 mg/L Cu2+ over 4 days generated 100% mortality in both invasive and native snail embryos; however, reducing the exposure time from 4 to 1 day resulted in 100% mortality in B. tentaculata but some hatching (7%) in P. gyrina. In contrast, embryos of both species exposed to 0.1 mg/L Cu2+ treatment for 4 days showed almost 100% survivorship. Further manipulations of Cu2+ concentrations and exposure times may yield regimes that maximize mortality in B. tentaculata while minimizing negative impacts on native species.
Mid
[ 0.6485148514851481, 32.75, 17.75 ]
Actress Thandie Newton gives a speech at TEDGlobal2011. When you have 15 minutes to spare – this is a MUST. Who knew she was so educated? You will definitely discover a lot in this speech. I am in awe.
High
[ 0.710791366906474, 30.875, 12.5625 ]
Q: How to verify invocations of the same mock method with the same argument that changes state between invocations in mockito? I have the following code to be unit tested: public void foo() { Entity entity = //... persistence.save(entity); entity.setDate(new Date()); persistence.save(entity); } I would like to verify that on the first invocation of persistence.save entity.getDate() returns null. Therefore I'm unable to use Mockito.verify(/*...*/) because at that time the method foo already completed and entity.setDate(Date) was called. So I think I need to do verifications of invocations already at the time the invocations happen. How do I do this using Mockito? A: I created the following Answer implementation: public class CapturingAnswer<T, R> implements Answer<T> { private final Function<InvocationOnMock, R> capturingFunction; private final List<R> capturedValues = new ArrayList<R>(); public CapturingAnswer(final Function<InvocationOnMock, R> capturingFunction) { super(); this.capturingFunction = capturingFunction; } @Override public T answer(final InvocationOnMock invocation) throws Throwable { capturedValues.add(capturingFunction.apply(invocation)); return null; } public List<R> getCapturedValues() { return Collections.unmodifiableList(capturedValues); } } This answer captures properties of the invocations being made. The capturedValues can then be used for simple assertions. The implementation uses Java 8 API. If that is not available one would need to use an interface that is able to convert the InvocationOnMock to the captured value. The usage in the testcase is like this: @Test public void testSomething() { CapturingAnswer<Void,Date> captureDates = new CapturingAnswer<>(this::getEntityDate) Mockito.doAnswer(captureDates).when(persistence).save(Mockito.any(Entity.class)); service.foo(); Assert.assertNull(captureDates.getCapturedValues().get(0)); } private Date getEntityDate(InvocationOnMock invocation) { Entity entity = (Entity)invocation.getArguments()[0]; return entity.getDate(); } The capturing that is done by the presented Answer implementation can't be achieved with Mockitos ArgumentCaptor because this is only used after the invocation of the method under test.
High
[ 0.6839694656488551, 28, 12.9375 ]
Introduction ============ Microalgae are promising source of biomass due to their advantageous features such as their phototropic nature, high growth rate, lack of competition with food crops for arable land, and abundant nutritious components, such as protein, pigments, and trace elements ([@ref-14]; [@ref-37]). Therefore, it has been used as feedstock, such as in food, feed, functional foods, biofuels, or chemicals integrated in novel biorefinery concepts ([@ref-43]; [@ref-36]). Unlike terrestrial plants, the biologically active compounds extracted from microalgae have shown unique properties, such as antibacterial, antiviral, antifungal, antioxidative, anti-inflammatory, and anti-tumor properties ([@ref-7]; [@ref-13]; [@ref-15]; [@ref-16]; [@ref-6]; [@ref-8]). From economical point of view, polysaccharides from algae are promising products due to their abundance in algae ([@ref-22]). Polysaccharides can be extracted from algae by several "green" extraction techniques, such as microwave-assisted extraction ([@ref-30]) and enzyme-assisted extraction methods ([@ref-21]). The characteristics of different polysaccharides from microalgae, including their composition and structure, were discussed ([@ref-7]). It was reported that *G. impudicum* and *C. vulgaris* contained homo galactose ([@ref-40]) and glucose ([@ref-27]), respectively. However, the other polysaccharides from microalgae are heteropolymers of galactose, xylose, glucose, rhamnose, fucose, and fructose ([@ref-24]; [@ref-34]; [@ref-28]). [@ref-11] found that the structure of the polysaccharides from *Phaeodactylum tricornutum* was a ramified sulfated flucoronomannan, with a backbone composed of β-(1,3)-linked mannose. Many studies have shown that the polysaccharides from microalgae are characterized by antibacterial, antitumor, and antiviral properties ([@ref-26]). As a kind of diatom, PTP has been found in great abundance in coastal and oceanic waters ([@ref-4]). It contains approximately 36.4% crude protein, 26.1% carbohydrate, 18.0% lipid, 15.9% ash, and 0.25% neutral detergent fiber on a dry weight (dw) basis ([@ref-29]). In addition, it can accumulate valuable pigments such as fucoxanthin, triacylglycerols, and omega-3 long-chain polyunsaturated fatty acids, such as eicosapentaenoic acid (EPA; C20:5) ([@ref-18]; [@ref-31]; [@ref-41]; [@ref-25]). Currently, it is commercialized for its lipids, especially EPA, and several studies have sought to increase the production yield of EPA and biomass ([@ref-12]; [@ref-2]; [@ref-25]). In recent years, due to its many therapeutic activities, fucoxanthin has been commercialized from PTP. However, there is little research about the polysaccharides extracted from PTP. Therefore, to make full use of the alga, in this paper, we extracted polysaccharides from PTP, characterized its chemical structure, and studied the anticancer activity of the polysaccharides. Materials and methods ===================== *Phaeodactylum tricornutum* samples and reagents ------------------------------------------------ Dried PTP powder was supplied by the Institute of Oceanology, Chinese Academy of Sciences. All the reagents used were of analytical grade and commercially available unless otherwise stated. Extraction of polysaccharides from *Phaeodactylum tricornutum* (PTP) -------------------------------------------------------------------- The extraction diagram was as [Fig. 1](#fig-1){ref-type="fig"}. ![Extraction process.\ The extraction diagram of PTP.](peerj-07-6409-g001){#fig-1} The dried PTP powder was extracted by the Soxhlet method with ethanol to remove pigments and lipids. The residue was then dried in an oven at 50 °C, and polysaccharides were extracted by hot distilled water with the assistance of ultrasonic methods. The optimal temperature, times of ultrasonic treatment, and extraction time were determined (shown in [Supplemental Information](#supplemental-information){ref-type="supplementary-material"}). According to the optimal conditions, the residue algal powder was treated by the ultrasonic method for 20 times, 10 s working, 10 s rest, and 380 W power. Then, it was extracted at 80 °C for 2 h with stirring. The solution produced by filtration was condensed by rotary evaporator and dialyzed for salt removal. The obtained solution was condensed again, and the final solution was freeze-dried to get the purified sulfated polysaccharides, called PTP. Chemical characterization ------------------------- The Mw of PTP was measured by HPLC with a TSK gel G4000PWxl column using 0.05 mol/L Na~2~SO~4~ as the mobile phase on an Agilent 1260 HPLC system equipped with a refractive index detector. The column temperature was 35 °C, and the flow rate of the mobile phase was 0.5 mL/min. Dextran standards with a Mw of 1, 5, 12, 50, 80, 270, and 670 KDa (Sigma, Mendota Heights, MN, USA) were used to calibrate the column. Total sugars were analyzed by the phenol-sulfuric acid method ([@ref-10]) using galactose as the standard. sulfated content was determined by the barium chloride gelatin method ([@ref-17]). The molar ratios of the monosaccharide composition were determined according to [@ref-33]. 1-phenyl-3-methyl-5-pyrazolone pre-column derivation HPLC was used to determine the molar ratio of the monosaccharide composition. Briefly, 10 mg polysaccharide sample was dissolved into one mL distilled water. The mixture was hydrolyzed in 4 mol/L trifluoroacetic acid, followed by neutralization with sodium hydroxide. Then, HPLC was used to determine every monosaccharide composition on a YMC Pack ODS AQ column (4.6 mm × 250 mm). Mannose, rhamnose, fucose, galactose, xylose, glucose, and glucuronic acid from Sigma-Aldrich were used as standards. FT-IR spectra of PTP were determined on a Nicolet-360 FT-IR spectrometer between 400 and 4,000 cm^−1^. Evaluation of inhibiting HepG2 growth activity in vitro ------------------------------------------------------- ### Cell culture HepG2 cells purchased from Kunming Cell Bank, Chinese Academy of Sciences, were cultured in DMEM supplemented with 10% fetal bovine serum solution, 100 U/mL penicillin and 100 mg/mL streptomycin at 37 °C in a humidified atmosphere containing 5% CO~2~. ### Evaluation of inhibiting HepG2 growth activity in vitro The cell growth inhibitory activity of PTP with different concentrations (50, 100, 150, 200, and 250 ug/mL) was assessed by MTT assay. The cells were seeded in a 96-well plate at a concentration of 1 × 10^4^ cells/mL and incubated with various concentrations PTP for 48 h. Then, 200 ul 0.5 mg/mL MTT solution was added to each well. After 4 h incubation, the plates were centrifuged for 10 min at 8,000 rpm. MTT solution was removed. And 200 uL DMSO was added into each well. The absorbance at 570 nm was determined. ### Apoptosis assessment The apoptosis states of HepG2 cells were determined by an Annexin V-FITC/PI apoptosis kit. Cells were collected and washed with ice-cold PBS twice. Then, the cells were resuspended and diluted to 1 × 10^6^ cell/mL with binding buffer. The suspended cells were dyed by 10 μL of Annexin V-FITC for 30 min at room temperature and then stained with five μL of propidium iodide (PI) for 5 min. After incubation, the apoptosis of cells was determined by flow cytometry with Guava® easyCyte 6-2L (Millipore, Billerica, MA, USA). ### Analysis of the cell cycle A cell cycle analysis kit (Beyotime, Haimen, Jiangsu, China) was used to analyze the cell cycle according to the manufacturer\'s instructions. Briefly, cells were plated in DMEM with different concentrations of sample for 24 h. Then, both the suspension and the adherent cells were collected and placed into the flow cytometry tube and centrifuged at 1,500 rpm for 5 min to obtain cell pellets. After that, the cell pellets were washed with precooling PBS and fixed in ice-cold 70% ethanol overnight at 4 °C. Fixed cells were rewashed with PBS and incubated with PI staining solution (0.5 mL of staining buffer, 25 μL of PI staining solution, and 10 μL of RNAase A) for 30 min at 37 °C in the dark. Cell cycle analysis was carried out with Guava® easyCyte 6-2L (Millipore, Billerica, MA, USA) using 10,000 counts per sample. The percentage of cells distributed in the different phases of G0/G1, S, and G2/M were recorded and analyzed. Statistical analysis -------------------- All data are shown as means ± SD (standard deviation) of three independent experiments to ensure the reproducibility of the results. Statistical analysis was performed using SPSS. The difference among groups was analyzed by one-way ANOVA. Results ======= Chemical characterization ------------------------- *Phaeodactylum tricornutum* was extracted and purified from , with a yield of 1.5%(% dw). It was further characterized regarding Mw, total sugars, sulfate content, and monosaccharide composition ([Table 1](#table-1){ref-type="table"}). 10.7717/peerj.6409/table-1 ###### Chemical composition. ![](peerj-07-6409-g006) Sample Total sugar/% Sulfate/% Mw/kDa Monosaccharides composition (Molar ratio) -------- --------------- ----------- -------- ------------------------------------------- ------ ------ ------ ------ ------ ------ PTP 29.94 20.36 4810 0.00 0.25 0.68 0.53 0.56 1.00 0.75 **Notes:** Chemical composition of PTP (%w/w dry weight). Man, mannose; Rha, rhamnose; Glc A, glucuronic acid; Gal, galactose; Glc, glucose; Xyl, xylose; Fuc, fucose. According to [Table 1](#table-1){ref-type="table"}, the total sugar and sulfate contents were 29.94% and 20.36%, respectively, which indicated that PTP was a type of sulfated polysaccharide. The Mw of PTP was higher (4,810 kDa). The results of the monosaccharide composition showed that the most common monosaccharide of PTP was xylose, followed by fucose, glucose, and galactose, with a small amount of rhamnose. The glucuronic acid content of PTP (0.68) was higher. These results indicated that PTP was a hybrid and acidic polysaccharide. To further characterize the chemical structure of PTP, the corresponding FT-IR spectrum was examined ([Fig. 2](#fig-2){ref-type="fig"}). The O--H stretching vibration appeared at 3,272 cm^−1^, and the C--H stretching vibration appeared at 2,926 cm^−1^. The adsorption at 1,632 and 1,408 cm^−1^ represented the asymmetric and symmetric stretching vibration of C=O, respectively. The adsorption at 1,226 and 1,038 cm^−1^ corresponded to the S=O stretching vibration and C--O--H deformation vibration, respectively. These results further indicated that PTP was an acidic and sulfated polysaccharide, which chelated with other positive ions. ![FTIR.\ FT-IR spectra of PTP.](peerj-07-6409-g002){#fig-2} Evaluation of inhibiting HepG2 growth activity in vitro ------------------------------------------------------- [Figure 3](#fig-3){ref-type="fig"} shows the inhibitory effect of different concentrations of PTP on HepG2 tumor cells. The results indicated that PTP had an antiproliferative effect on HepG2 cells in a dose-dependent manner. With concentration increasing, PTP had higher inhibitory activity, and the inhibition rate was up to 60.37% when the concentration was 250 ug/mL. However, the manner of PTP inhibiting HepG2 growth was not clear. To analyze the main cause, we determined the cell apoptosis and cell cycle by flow cytometry. ![Inhibition rate of HepG2 by MTT assay.\ The effect of different concentration PTP on the inhibition rate of HepG2 by MTT assay for 48h.](peerj-07-6409-g003){#fig-3} Induction of apoptosis according to cell cycle analysis ------------------------------------------------------- [Figure 4](#fig-4){ref-type="fig"} shows the results of flow cytometry, when the HepG2 cells were treated with different concentrations of PTP. From the results, we deduced the apoptosis rate under different concentrations of PTP (shown in [Fig. 4](#fig-4){ref-type="fig"}). From [Fig. 4](#fig-4){ref-type="fig"}, when HepG2 cells were treated with PTP, the apoptosis rate increased in a dose-dependent manner, although it decreased slightly under 200 ug/mL PTP. When the concentration of PTP was 250 ug/mL, 30% apoptosis of cells was induced. Double negative PI-Annexin V cells accounted for about 63%. The above results were consistent with those of the MTT assay. They indicated that PTP could significantly induce cell apoptosis. Then, we determined the HepG2 cell cycle rate under three different concentrations (50, 150, and 250 ug/mL) of PTP, as shown in [Fig. 5](#fig-5){ref-type="fig"}. From [Fig. 5](#fig-5){ref-type="fig"}, the treatment of different concentrations of PTP did not influence the HepG2 cell cycle rate, which might indicate that PTP's anticancer effect occurred mainly through induction of apoptosis without affecting the mitosis of HepG2 cells. ![Cell apoptosis rate.\ The cell apoptosis rate under different concentration of PTP.](peerj-07-6409-g004){#fig-4} ![Cell cycle.\ The cell cycle rate under different concentration of PTP.](peerj-07-6409-g005){#fig-5} Discussion ========== Cancer is the leading threat to the world population, and it is the first-leading cause of death worldwide. The current cancer treatments often cause side effects ([@ref-32]; [@ref-5]). Recently, due to their favorable properties, polysaccharides from microalgae have been given increased attention. Polysaccharides from *Spirulina platensis* have been shown to have antitumor functions on human HT-29 cells ([@ref-38]), MB-231 cells ([@ref-39]), HeLa cells ([@ref-42]) and HepG2 cells ([@ref-9]). Polysaccharides from *Platymonas subcondigoramis* inhibited melanoma ([@ref-23]). [@ref-35] showed that polysaccharides from the dinoflagellate *Gymnodinium* sp. exhibited significant cytotoxicity against a variety of cancer cells, which meant that the polysaccharides might be a potential anticancer chemotherapeutic agent. For PTP, some references reported antioxidant ([@ref-1]), anti-obesity ([@ref-19]), anti-inflammatory, and immunomodulatory activities ([@ref-20]; [@ref-13]). A novel fatty alcohol ester isolated from PTP showed apoptotic anticancer activity ([@ref-32]). Few studies have addressed polysaccharides isolated from PTP. [@ref-1] extracted endo-exopolysaccharide and determined its antioxidant activity on DPPH. The composition of the polysaccharides included xylose, glucose, and galactose. Similarly, the monosaccharide composition of PTP mainly included xylose, fucose, glucose and galactose. Fucose was not reported by [@ref-1], which may be due to the different origins of the algae. In this paper, we determined not only the monosaccharide composition but also the total sugar, sulfate contents and Mw (29.94%, 20.36%, and 4,810 kDa, respectively) and found that PTP is a complicated sulfated polysaccharide. A type of lipopolysaccharide extracted from Phaeodactylum tricornutum exhibited anti-inflammatory activity by blocking the activation of nuclear factor-κB and phosphorylation of p38 mitogen-activated protein kinases, extracellular signal-regulated kinases 1 and 2 and c-Jun N-terminal kinase ([@ref-20]). However, there was no related information about the lipopolysaccharide. To our knowledge, no anticancer activity has been reported for PTP. In this paper, we determined the anticancer activity of PTP on HepG2 cells. Significant anticancer activity (up to 60.37% under 250 ug/mL) by MTT assays, which was much better than for polysaccharides isolated from *Spirulina platensis* ([@ref-38], [@ref-39]). In addition, several studies reported that polysaccharides isolated from *Spirulina platensis* exhibited anticancer activity by blocking G0/G1 phase of cancer cells, which induced the mitosis of cancer cells and led to apoptosis of the cells ([@ref-38], [@ref-39]; [@ref-42]; [@ref-9]). However, in this paper, although the apoptosis rate of HepG2 cells increased, cell cycle analysis indicated that PTP's anticancer effect occurred mainly through induction of apoptosis without affecting the cell cycle and mitosis of HepG2 cells. This result might differ according to the chemical components and structure. It needs further investigation. In addition, some references reported that microalgae polysaccharides have the capacity to modulate the immune system so that they display anticancer activity in vivo ([@ref-3]). For this study, only in vitro cell experiments were carried out, and it is necessary to explore the anticancer activity in vivo. Further research will address this issue. Conclusion ========== In this paper, a sulfated polysaccharide (PTP) was extracted from PTP with a high Mw (4,810 kDa). The monosaccharide composition of PTP was mainly xylose, fucose, glucose, and galactose. MTT assays showed that PTP has significant anticancer activity (up to 60.37% under 250 ug/mL). Furthermore, the anticancer effect occurred mainly through induction of apoptosis without affecting the cell cycle and mitosis of HepG2 cells. Thus, PTP may be a potential drug for anticancer treatment. Supplemental Information ======================== 10.7717/peerj.6409/supp-1 ###### Anticancer activity of PTP. ###### Click here for additional data file. 10.7717/peerj.6409/supp-2 ###### Apoptosis and cycle analysis of PTP. ###### Click here for additional data file. 10.7717/peerj.6409/supp-3 ###### Extraction. Selecting the optimal extraction conditions ###### Click here for additional data file. Additional Information and Declarations ======================================= The authors declare that they have no competing interests. [Shengfeng Yang](#author-1){ref-type="contrib"} conceived and designed the experiments, performed the experiments, prepared figures and/or tables, authored or reviewed drafts of the paper, approved the final draft. [Haitao Wan](#author-2){ref-type="contrib"} performed the experiments. [Rui Wang](#author-3){ref-type="contrib"} analyzed the data. [Daijun Hao](#author-4){ref-type="contrib"} analyzed the data, contributed reagents/materials/analysis tools. The following information was supplied regarding data availability: The raw measurements are available in the [Supplementary Files](#supplemental-information){ref-type="supplementary-material"}.
High
[ 0.6640625, 31.875, 16.125 ]
Q: How to compare two "numbers" with multiple dots? I have an unordered list that can look something like this: 1 2.2 1.1.1 3 When i sort the list, 1.1.1 becomes greater than 3 and 2.2, and 2.2 becomes greater than 3. This is because Double.Parse removes the dots and makes it a whole number. This is the method i use to sort with: public class CompareCategory: IComparer<Category> { public int Compare(Category c1, Category c2) { Double cat1 = Double.Parse(c1.prefix); Double cat2 = Double.Parse(c2.prefix); if (cat1 > cat2) return 1; else if (cat1 < cat2) return -1; else return 0; } } How can i fix this? Thanks A: Are these version #s by chance? Can you use the Version class? It sorts each part as you seem to want, although it only works up to 4 parts. I would not recommend parsing into a numeric value like you are doing. It has an IComparable interface. Assuming your inputs are strings, here's a sample: public class CompareCategory: IComparer<Category> { public int Compare(Category c1, Category c2) { var cat1 = new Version(c1.prefix); var cat2 = new Version(c2.prefix); if (cat1 > cat2) return 1; else if (cat1 < cat2) return -1; else return 0; } } If you need something with more than 4 "parts", I think I would create a comparer which split the strings at the dots, and then parse each element as an integer and compare them numerically. Make sure to consider cases like 1.002.3 and 1.3.3 (what do you want the sort order to be?). Update, here is a sample of what I mean. Lightly tested: public class CategoryComparer : Comparer<Category> { public override int Compare(Category x, Category y) { var xParts = x.prefix.Split(new[] { '.' }); var yParts = y.prefix.Split(new[] { '.' }); int index = 0; while (true) { bool xHasValue = xParts.Length > index; bool yHasValue = yParts.Length > index; if (xHasValue && !yHasValue) return 1; // x bigger if (!xHasValue && yHasValue) return -1; // y bigger if (!xHasValue && !yHasValue) return 0; // no more values -- same var xValue = decimal.Parse("." + xParts[index]); var yValue = decimal.Parse("." + yParts[index]); if (xValue > yValue) return 1; // x bigger if (xValue < yValue) return -1; // y bigger index++; } } } public static void Main() { var categories = new List<Category>() { new Category { prefix = "1" }, new Category { prefix = "2.2" }, new Category { prefix = "1.1.1" }, new Category { prefix = "1.1.1" }, new Category { prefix = "1.001.1" }, new Category { prefix = "3" }, }; categories.Sort(new CategoryComparer()); foreach (var category in categories) Console.WriteLine(category.prefix); } Output: 1 1.001.1 1.1.1 1.1.1 2.2 3
Mid
[ 0.6267029972752041, 28.75, 17.125 ]
The characteristics of the TOPIX family This multi award-winning luminaire ensures a playful light and gives you a lot of freedom. So you can put together an attractive or artistic cluster of light by combining multiple devices. You can also choose the color of the light: warm white or cool white. The fixture itself, which is semi recessed and semi surface, is available in aluminium grey or white and also comes in a version for outside, giving you the opportunity to make your façade stand out.
Low
[ 0.363420427553444, 19.125, 33.5 ]
Q: Why does Hibernate insert a parent row with a foreign key without inserting the child row? I'm hoping someone has run into this problem before and can help me out. Basically, Hibernate is inserting a parent row (with an ID pointing to a child row), but not inserting that child row with the associated ID, which leaves the database in a bad state. Here's an example of the exception that's thrown when Hibernate tries to load the improperly saved object: 27 Jun 2011 13:55:31,380 ERROR [scheduler_Worker-4] - Job DEFAULT.queryScrubJobDetail threw an unhandled Exception: org.springframework.scheduling.quartz.JobMethodInvocationFailedException: Invocation of method 'doIt' on target class [XXX] failed; nested exception is org.springframework.orm.hibernate3.HibernateObjectRetrievalFailureException: No row with the given identifier exists: [XXX.DataProviderTransaction#60739703]; nested exception is org.hibernate.ObjectNotFoundException: No row with the given identifier exists: [com.idology.persist.DataProviderTransaction#2] This part of the application has three entities: Query, which is a parent of DataProviderTransactionReference and DataProviderTransaction DataProviderTransaction, which is a child of Query and a parent of DataProviderTransactionReference DataProviderTransactionReference, which has foreign keys pointing to DataProviderTransaction and Query Here are the mappings: From Query: @OneToMany(mappedBy = "query", cascade = { CascadeType.PERSIST, CascadeType.MERGE }, fetch = FetchType.LAZY) @Cascade(org.hibernate.annotations.CascadeType.SAVE_UPDATE) @JoinColumn(name = "query_id") public List<DataProviderTransactionReference> getDataProviderTransactionReferences() From DataProviderTransaction: @ManyToOne(fetch = FetchType.LAZY) @JoinColumn(name = "query_id") public Query getQuery() From DataProviderTransactionReference: @ManyToOne(cascade = { CascadeType.PERSIST, CascadeType.MERGE }, fetch = FetchType.EAGER) @JoinColumn(name = "data_provider_transaction_id") @Cascade(org.hibernate.annotations.CascadeType.SAVE_UPDATE) public DataProviderTransaction getDataProviderTransaction() { return mDataProviderTransaction; } The schema looks like this (leaving out the queries table since it has no foreign keys): data_provider_transaction +------------------+---------------+------+-----+---------+----------------+ | Field | Type | Null | Key | Default | Extra | +------------------+---------------+------+-----+---------+----------------+ | id | bigint(20) | NO | PRI | NULL | auto_increment | | query_id | bigint(20) | YES | MUL | NULL | | +------------------+---------------+------+-----+---------+----------------+ data_provider_txn_refs +------------------------------+------------+------+-----+---------+----------------+ | Field | Type | Null | Key | Default | Extra | +------------------------------+------------+------+-----+---------+----------------+ | id | bigint(20) | NO | PRI | NULL | auto_increment | | created_at | datetime | YES | | NULL | | | data_provider_transaction_id | bigint(20) | YES | MUL | NULL | | | query_id | bigint(20) | YES | MUL | NULL | | +------------------------------+------------+------+-----+---------+----------------+ So once we're done running a query (represented by the Query object), we save it using Spring and Hibernate using the following: getHibernateTemplate().saveOrUpdate(aQuery); The Query is saved along with the associated DataProviderTransaction and DataProviderTransactionReference entities. Except that sometimes it saves a Query and a DataProviderTransactionReference without the associated DataProviderTransaction. It does put an ID in the data_provider_transaction_id but it points to a row that does not exist in the data_provider_transaction table. The next step is to add a foreign key constraint to cause the problem to occur when we do the initial save rather than when we try to load the object later. We're using Spring 2.5.6, Hibernate 3.3.2, and MySQL 5.0. I've seen the problem occur over the years with earlier versions of Spring and Hibernate, though. Anyone ever seen/solved this problem? A: This sounds like a problem with your id allocation with MySQL. Hibernate can get confused if the generators are not declared correctly, or if you are doing strange things with your code. Do you have orphan DataProviderTransactions or DataProviderTransactionReferences, A DataProviderTransaction which has a query id which does not exist, or point to the wrong Query? Are your generators declared as identity for your ids? (see Chapter 5. Basic O/R Mapping, section 5.1.4 id. Normally, this should be enough, but there may be other things you're doing which confuse hibernate. So, for instance: @Id @GeneratedValue(strategy = IDENTITY) @Column(name = "id", unique = true, nullable = false) To really track this down, you need to know why this is happening, who is inserting these rows. You need a foreign key constraint in the database. It's also possible that something is deleting the DataProviderTransaction and the database isn't complaining because there is no foreign key.
Mid
[ 0.5882352941176471, 33.75, 23.625 ]
vape juice Secrets Being an EU member their vaping regulations largely mirror the united kingdom’s. Vaping is permitted in areas in which you can smoke but there is now a total ban on using tobacco in all bars, restaurants and workplaces.Some nations such as the United states of america, Australia and Russia have the two countrywide and state/regional rules. In the… Read More We offer lots of wide variety so you're able to see just how multipurpose vaping can definitely be. No matter whether you want vape juice with zero nicotine, or else you are trying to find a particularly tough-to-come across taste, We have precisely what you need.Offering vape mods & kits that permit you to customize and personalize your vaping exp… Read More Any person new to vaping and in many cases experienced vapers is usually a minor confused with all of different mods, options and gadgets offered.We believe in sustaining our standing for high quality by carrying what we sense are classified as the very pinnacle brand name names in this market place, and we choose to maintain you returning for nice… Read More Halo is one of the top rated e-liquid makes produced in America. The high quality e-liquids are created in Halo’s individual 100,000 square foot facility in Florida. They adhere to strict expectations you can study more about on their Internet site. A good way to get going is to get a Halo starter pack. The $24.99-packs incorporate six 10ml bottl… Read More A dementia advocacy team has not too long ago awarded a $9.4 million exploration grant to carry out a double-blind scientific demo involving nicotine’s prospective effects on cognitive memory. In the event the setting up and evaluation levels are taken into account,...The last word CUSTARD E-LIQUID RECIPEHow to mix your personal shop acquired cus… Read More
Low
[ 0.46, 25.875, 30.375 ]
Q: Aligning tumblr posts in masonry grid I was trying to make a theme for my tumblr blog, which should look like this Menubar and sidebar is ok, but I am having a little problem in aligning the posts as in the picture above, but i ended up having this in my blog. Please help me. I am using codes as.... CSS : #content{ width:900px; top:65px; left: 10px; float: left; position: absolute; } #container{ float:left; background:#000; width: 900px; margin: 0px auto; left:10px; } .entry { float:left; width: 350px; overflow:hidden; margin: 15px; padding: 15px; background: {color:box}; display: inline-block; position: relative; z-index:2; -webkit-border-radius:3px; -moz-border-radius:3px; border-radius:3px; } .entry img { display: block; width:auto; max-width: 100%; } HTML : <div id="container"> <div id="content"> <div class="autopagerize_page_element"> {block:Posts} <div class="entry"> {........Different types of posts........} </div> {/block:Posts} </div></div></div> JQUERY : <script src="http://static.tumblr.com/82upcij/4Kio3rj0h/masonry.js"> </script> <script type="text/javascript"> $(window).load(function () { $('#content').masonry(), $('.masonryWrap').infinitescroll({ navSelector : '#pagination', nextSelector : '#pagination a#nextPage', itemSelector : ".entry, .clear", bufferPx : 40, loadingImg : "", loadingText : "Loading", }, function() { $('#content').masonry({ appendedContent: $(this) }); } ); }); </script> A: You're not using Masonry correctly. Essentially, you're calling it, but not passing it any parameters so it doesn't know what to do. You're also calling it on the wrong element. Your problems with infinite scroll, which you didn't ask about, are another matter, but here's how you'll want to fix that Masonry call: $(".autopagerize_page_element").masonry({ itemSelector: ".entry" });
Mid
[ 0.6139534883720931, 33, 20.75 ]
A case brought to Colombia’s top court by anti-abortion campaigner Natalia Bernal Cano could transform the country’s abortion law when the verdict is announced in the next few weeks – but perhaps not in the way she hoped. Since a 2006 ruling by Colombia’s powerful Constitutional Court, women have been allowed to terminate a pregnancy in cases of rape or incest, fatal fetal abnormality, or danger to the physical or mental health of the mother. Those three exceptions put Colombia in a middle-of-the-road position among Latin American and Caribbean countries’ exceptionally strict regimes on abortion. Six countries in the region, including El Salvador and the Dominican Republic, ban all abortions, whatever the circumstances. Only Uruguay, Cuba and Guyana allow all elective abortions in early pregnancy. Last year Bernal, a lawyer, filed two legal actions in the Constitutional Court, hoping to push Colombia back into the former camp. She argues that the three exceptions are unconstitutional, on the grounds that all abortions carry health risks “for both the woman and her unborn child”. But one of the nine judges examining the case, Alejandro Linares Cantillo, argued that the court should consider why abortion is illegal in the first place. On Feb. 19 he issued a formal proposal for the other judges to consider legalizing all abortions in the first 16 weeks of pregnancy. Between them, Linares and Bernal have revived a tense debate in Colombia, where almost three quarters of the population are Catholic. The ruling, expected by early March, will be closely watched in Colombia, and the rest of Latin America. A National Controversy Opponents of abortion say Colombian authorities have become too permissive about the procedure since 2006. Conservative politicians expressed outrage at the case of a woman in the western city of Popayán, who had a legal abortion in January at seven months pregnant as a result of mental-health problems. The woman’s ex-boyfriend, who had not wanted her to get an abortion, waged a widely-reported campaign against her decision, staging protests and later threatening to sue her. Bernal argues that exceptions like the one used by the woman in Popayán “cause immeasurable harm to the people of Colombia,” she told national newspaper El Espectador, including “post-traumatic stress” and “serious depressions” for women who have abortions. Bernal has issued several unsuccessful requests for Linares to be recused for the case, arguing the judge, known for liberal leanings, is biased. Status Quo Abortion-rights groups say the Popayán case is an illustration of how hard it is to even get a legal abortion. Family-planning nonprofit Profamilia said the woman had been seeking a termination since her first trimester, but health officials refused her. The organization says 94% of women who seek an abortion do so within the first 15 weeks of pregnancy. Paula Avila Guillen, a human rights lawyer and the Latin America director at the New York–based Women’s Equality Center, says the current law discriminates against “poorer women who rely on the public health system” where the three-exceptions law is patchily implemented, while rich women can access abortions more easily from private doctors. Advocates argue that legalizing all abortions in Colombia would prevent women from facing lengthy bureaucratic delays and free them from fear of arrest or prosecution if they seek medical help; data released by Colombia’s attorney general last year showed that between 2005 and 2017, 2,290 women were prosecuted for having an abortion – including 502 minors. Uncertain Outcome The court is unlikely to reverse the 2006 decision, local media report, since it has already upheld the constitutionality of the three exceptions on several occasions. But it’s less clear what the outcome will be for Linares’ proposal for legal abortions up to 16 weeks. According to daily El Tiempo, four of the nine judges, including Linares, are likely to support the proposition and three are likely to oppose it. The two judges that are most likely to be swing votes are both women, according to Guillen. Regional Impact Despite a wave of protests across the region in recent years, no Latin American country has legalized abortion since Uruguay in 2012. Argentine activists’ attempt to pass a legalization law failed in 2018, when the senate narrowly rejected the bill after the lower house approved it. Argentine legislators who support abortion are expected to try again soon, after new president Alberto Fernandez vowed to legalize abortion during his term. Guillen says the last three years have felt like a turning point for abortion rights in the region. “It feels like we are taking back control and starting to move forward again, after a lull.” The verdict in Colombia could turn the tide, she says, particularly if Bernal’s attempt to reverse liberalization backfires. “With abortion debates all over the region, that would be a very good precedent to have.” Get The Brief. Sign up to receive the top stories you need to know right now. Please enter a valid email address. Sign Up Now Check the box if you do not wish to receive promotional offers via email from TIME. You can unsubscribe at any time. By signing up you are agreeing to our Terms of Use and Privacy Policy . This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Thank you! For your security, we've sent a confirmation email to the address you entered. Click the link to confirm your subscription and begin receiving our newsletters. If you don't get the confirmation within 10 minutes, please check your spam folder. Write to Ciara Nugent at [email protected].
Low
[ 0.5043103448275861, 29.25, 28.75 ]
LA Council Orders Snack Attack Against Arizona Receive the latest prop-zero updates in your inbox L.A. City Council member Janice Hahn just unleashed the newest weapon in the war against Arizona's new immigration law: snacks. That's it. Who knew a bag of pretzels or a box of chocolates would have the power to threaten so many jobs and so much money in Arizona? Who knew our council's new boycott of our neighboring state would be all that and a bag of chips? The Los Angeles City Council just voted overwhemingly to boycott Arizona. 13-to-1 with one absence (Paul Krekorian). We'll show them. But of course, our beloved Los Angeles Lakers will take on the Phoenix Suns next week in an NBA playoff game, which is a little tough to boycott if you want to defend your NBA title. Immigration is one thing, but it's not as big as basketball. So we asked Janice Hahn, who sponsored the boycott move, if Laker fans should stay away from Arizona, and watch Kobe and company battle Steve Nash and his teammates on TV. She said she hoped the Lakers would only have to play two games in Phoenix, and she hoped that any fans who would go to the game would bring their own snacks, instead of pumping money into the Arizona recovery. Really? So, let's boycott Arizona, except for the 2 games the Lakers have to play in Phoenix, and avoid buying hot dogs and beer. That'll show Arizona we can't tolerate their intolerance of immigrants. Last time I looked, boycott was pretty much an all or nothing proposition. But of course that doesn't seem to apply to defending one's NBA title. Maybe Ed Reyes, another councilman voting for the boycott, summed up the council's feelings, "We're not playing the governor, we're playing Los Suns." Published at 3:33 PM PDT on May 12, 2010 | Updated at 7:40 AM PST on Feb 10, 2011
Low
[ 0.501706484641638, 36.75, 36.5 ]
A schizophrenic teen was fatally shot over the weekend in North Carolina by police officers. Now, the news outlet WECT reports that one of the officers who arrived at the scene in Boiling Spring Lakes, North Carolina has been placed on leave. The officer’s name is Detective Byron Vassey, though the police chief did not confirm whether he pulled the trigger. The incident started on Sunday afternoon, when three cops arrived at the home of 18-year-old Keith Vidal. The first officer who arrived at the home reported that there was a confrontation, but then told the second police unit that everything was OK. But shots were fired from an officer in the second unit, who arrived after the first officer. The teen’s father, Mark Wilsey, said that the family called the police for help with their schizophrenic son, who was holding a small screwdriver. The family says their son would not have hurt anyone with the screwdriver. Vidal, Wilsey’s son, was tasered first. But according to Wilsey, an officer said, “we don’t have time for this,” and then shot Vidal. "There was no reason to shoot this kid," Wilsey told WECT. "They killed my son in cold blood. We called for help and they killed my son." North Carolina is now investigating the incident.
Low
[ 0.492592592592592, 33.25, 34.25 ]
{ "multi_type":"topic", "text":"#Super Hero只爱钢铁侠#今晚的DIY作业图。图案没有刀模,是自己在网上搜图然后凭感觉画的。一晚上修改了N次,虽然还并不原版,但作为一个毫无绘画基础的糙汉来说,我觉得自己已经很牛B啦。啊哈哈哈~@Alienware外星人 @大明狐 @coser夜枫 @杨曰磊 @叮当-叮先生是也", "user":{ "verified":true, "description":true, "gender":"m", "messages":3765, "followers":16735, "location":"山东 济南", "time":1282143624, "friends":831, "verified_type":0 }, "has_url":false, "comments":82, "pics":1, "source":"微博 weibo.com", "likes":7, "time":1362412474, "reposts":306 }
Mid
[ 0.643776824034334, 18.75, 10.375 ]
Eurozone risks rising as outlook darkens Investors want to believe eurozone policymakers can resolve the debt crisis. But the risk of a prolonged recession is rising, and with it the chances that more action will be needed to shore up the currency area. A full 86% of fixed-income investors surveyed by Fitch Ratings said the European Central Bank's commitment to buy bonds of troubled eurozone nations, and European Union's plans for a banking union represent major positive steps, although 81% acknowledged "significant economic, financial and political risks remain." Private forecasters think the European Commission is overly optimistic in its view that the eurozone will return to growth next year, after contracting by 0.4% in 2012, as deep spending cuts and tax rises take effect. A weaker-than-expected performance would undermine those and other assumptions underpinning bailout programs in Greece and Portugal. It would also pile pressure on Spain to seek a formal bailout and further hobble core economies, such as France and Germany. "The view embodied in our forecast is essentially that 2013 is going to be another extremely challenging year," said James Nixon, economist at Societe Generale, which sees the eurozone economy shrinking by 0.3% next year. "The governments of Greece, Spain and Italy have embarked on multi-year consolidation programmes and next year is the second of three," he said. "We're already in the (fiscal) cliff this year and there is further fiscal tightening to come in 2013," said Marie Diron, director of macro forecasting at Oxford Economics. Spending by governments on goods and services, which has a direct impact on economic activity, would fall by 0.8%, compared with just 0.1% in 2012, Diron said, pointing to cuts in Spain and Italy that have not yet been implemented. Buffett: Eurozone may not survive Southern Europe's woes have already begun to affect the core. Germany has seen growth slow, and Moody's stripped France of its AAA credit rating Tuesday, citing its exposure to shocks from the eurozone periphery. Reaction was muted -- the euro dipped and French government bonds were broadly stable -- but Moody's warned that any further deterioration in France's economic prospects or ability to implement reform could trigger another cut. The downgrade could presage cuts for those top-rated countries, said Steven Englander, global head of G10 FX Strategy at Citi(C). "Little of what they cite is new and the downgrade reflects a reality that has probably long applied to France and applies to a number of the remaining AAA countries as well," said Englander. Germany, the Netherlands and Austria are feeling the effects of the eurozone slowdown and like France, are also funding existing bailouts. Market nerves were calmed in September when the ECB announced its bond-buying program. The program, known as outright monetary transactions or OMT, requires governments to seek a formal bailout first. Spain, which has already received pledges of support to recapitalize its banking system, has held off asking for a bailout but has a mountain to climb in 2013 to meet its fiscal targets. "The government's plan so far seems to have been to wait-and-see and it is unclear why this should change unless markets were to sell off more broadly or economic activity to fall even more sharply, creating a stronger sense of urgency," UBS FX strategist Beat Siegenthaler said in a note. "The risk of a broader sell-off has certainly increased over recent weeks as the OMT-induced rally has run its course and, apart from a favorable Greek review decision, there seems little on the policy horizon in terms of supportive events," he added. Underscoring the challenges facing southern Europe, Moody's also kept a negative outlook on Italy's banks, and said the ratio of problem loans was rising faster than it expected, driven by the impact of the recession on companies. "This trend shows no sign of abating; combined with bank deleveraging and a corresponding contraction in the supply of credit, further pressures on asset quality are inevitable," the agency said.
Mid
[ 0.556097560975609, 28.5, 22.75 ]
Video report by ITV News reporter Martha Fairlie Some 128,000 children in the UK will wake up homeless on Christmas day, the highest number in a decade, according to a housing charity. Shelter's chief executive Polly Neate said the figure, which has jumped by two-thirds since 2011, is a "national scandal". Many homeless families are put into temporary accommodation by local authorities, often sharing a single room with parents sleeping in the same bed as their children. It can cause families "psychological turmoil", Shelter's report said, with children experiencing anxiety, shame and fear. Several parents also said their child's mental and physical health had declined since they became homeless - citing bed bug infestations, broken heating, and stress. Ellie, 15, told Shelter about the problems of living in a cramped room with her whole family. She said: "It's hard to concentrate at school because there's the worry about coming home. It's just stressful. "There's nowhere we can relax or get any privacy. Before it was much better. "We had our own home right near school and right near our friends. We all had our own rooms and a cooker and a fridge. We could eat proper meals. I just want it to be like it was before." Almost half of families in England placed into B&Bs stay beyond the legal six-week limit, the charity added. Louis Williams, who lives with his family in temporary accommodation, shared with Shelter his letter to Santa. It read: "Dear Santa, Please can I have a forever home. I don't want any new toys, I just want all of my old toys that are in storage and I would like my own lego bedroom with a desk to build my models. "Everyone is sad living here and I just want us to be happy again." The Shelter report comes amid the first sustained increases in child and pensioner poverty for 20 years. Almost 400,000 more children and 300,000 more pensioners are living in poverty than four years ago, according to the Joseph Rowntree Foundation. It's a national scandal that the number of homeless children in Britain has risen every year for the last decade. Many of us will spend Christmas day enjoying all of the festive traditions we cherish, but sadly it'll be a different story for the children hidden away in cramped B&Bs or hostel rooms. No child should have to spend Christmas without a home - let alone 128,000 children. > Shelter chief executive, Polly Neate Shelter said: "Most of us are unaware of how homeless children live. Families rarely experience the most visible symptom of homelessness - having to sleep rough. "They are often embarrassed to even let relatives or friends see where they are having to live." Responding to the report, a spokesman for the Department for Communities and Local Government said: "This government is committed to breaking the homelessness cycle once and for all, and is working with Shelter and others to do this. "We're providing over £1 billion until 2020 to tackle the issue and are implementing the Homelessness Reduction Act - the most ambitious legislation in decades that will mean people get the support they need earlier. "Councils have a duty to provide safe, secure and suitable temporary accommodation. This means that people are getting help now and no family is without a roof over their head this Christmas."
Mid
[ 0.647058823529411, 33, 18 ]
Wisconsin Card Sorting Test: factor structure and relationship to productivity and supervision needs following severe traumatic brain injury. The Wisconsin Card Sorting Test (WCST) has been demonstrated to have a relatively stable factor structure in traumatic brain injury (TBI) samples. What is less clear is whether the scores derived from WCST factors are related to functional outcomes. The purpose of the current study was to replicate the WCST factor structure in a sample with severe TBI, and to evaluate the relationship between the factor scores and outcome. Retrospective correlational study. Participants (n=143) who had suffered severe TBI were administered a battery of neuropsychological tests including the WCST within one month of admission to a brain injury rehabilitation program. In addition, participants were administered supervision (Supervision Rating Scale; SRS) and productivity measures (Community Integration Questionnaire- Productivity subscale; CIQ-P) at admission and following discharge. None. For individuals who were more than one year post injury, more failure to maintain set errors were associated with better occupational outcomes, while more nonperseverative errors were associated with increased supervision needs. The WCST factor scales are related to functional outcomes in severe TBI. Specifically, the inability to establish a series of correct responses is associated with poorer outcome.
Mid
[ 0.6333333333333331, 33.25, 19.25 ]
Kelly Bailey (composer) Kelly Bailey is a composer, musician and programmer. He was the senior game designer of sound and music at Valve until he left in 2011 with Mike Dussault, to concentrate on their project Sunspark Labs LLC. Valve composer Mike Morasky mentioned in February 2014 that Bailey had returned to Valve but in a February 2016 article on Forbes it was reported he has founded his own company, IndiMo Labs, and he is no longer with Valve. Biography On the defunct Half-Life website, his function was described as follows: "Kelly did all of the music and sound effects for Half-Life, and wrote sound code to create character speech and DSP reverb effects." On the previous version of Valve's official website, his function was described as follows: "Kelly, formerly a product unit manager at Microsoft, has a programming background that includes consumer multimedia, database engines, and networking. He created all the music and sound effects for Half-Life." On a later version of Valve's official website, his function was described as follows before it was removed after he left the company: "Kelly is Valve's senior audio producer, responsible for creating sound effects & music." Half-Life 2'''s Gordon Freeman's face was based on him, as well as on three other Valve employees – David Speyrer, Eric Kirchmer and Greg Coomer. Around March 2011, Kelly Bailey left Valve with colleague Mike Dussault to work on their project Sunspark Labs LLC, launched in December 2010, developing iOS applications, their first being "Morfo", released in June 2011. The news caused some concern and displeasure from the Steam community due to the lack of any public farewell or notification regarding Bailey's departure. However, at a press conference in February 2014, Mike Morasky (the current composer at Valve), stated that Kelly Bailey was working with Valve again. On 18 March 2016 Forbes wrote that Bailey is no longer with Valve but has created his own video game company, IndiMo Labs, and for the past seven months he had been spending sixteen hours a day as the sole developer behind Vanishing Realms: Rite of Steel, a virtual reality video game with RPG elements for the HTC Vive. The game released as an early access title on Steam on 5 April 2016, which was the Vive's launch day. Discography Video games Half-Life (1998) Half-Life 2 (2004) Half-Life 2: Episode One (2006) Portal (2007) Half-Life 2: Episode Two (2007) Vanishing Realms: Rite of Steel'' (2016) References Category:Year of birth missing (living people) Category:Living people Category:Valve Corporation people Category:Video game composers Category:Video game designers Category:New Zealand musicians
Mid
[ 0.61081081081081, 28.25, 18 ]
Why us? With the vision to establish world class academic institution Advanced College of Engineering and Management (acem) was established on 2000 under the affiliation of Tribhuvan University. acem has been offering BE level academic program on Civil and Computer since 2000, Electronics and Communication since 2001and Electrical since
Low
[ 0.48416289592760103, 26.75, 28.5 ]
Q: Crash when using Location.getSpeed It seems like everytime it tries to display the speed, it crashes, and as long it dosent have a location and needs to print out "--" it's fine! public class MainActivity extends Activity implements LocationListener { @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_main); LocationManager locManager = (LocationManager) getSystemService(Context.LOCATION_SERVICE); locManager.requestLocationUpdates(LocationManager.GPS_PROVIDER,0,0,this); this.onLocationChanged(null); } @Override public boolean onCreateOptionsMenu(Menu menu) { // Inflate the menu; this adds items to the action bar if it is present. getMenuInflater().inflate(R.menu.menu_main, menu); return true; } @Override public void onLocationChanged(Location location) { TextView textView = (TextView) findViewById(R.id.textView); if(location == null){textView.setText("--");} else{textView.setText((int)location.getSpeed());} } } A: Use textView.setText(String.valueOf((int)location.getSpeed())); Because when you passing an int to TextView.SetText, it expect a resource id
Low
[ 0.509090909090909, 24.5, 23.625 ]
#!/usr/bin/perl # It is highly recommended that you use version 6 upwards of # the UserAgent module since it provides for tighter server # certificate validation use LWP::UserAgent 6; # read post from PayPal system and add 'cmd' read (STDIN, $query, $ENV{'CONTENT_LENGTH'}); $query .= '&cmd=_notify-validate'; # post back to PayPal system to validate $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 1 }); $req = HTTP::Request->new('POST', 'https://www.paypal.com/cgi-bin/webscr'); $req->content_type('application/x-www-form-urlencoded'); $req->header(Host => 'www.paypal.com'); $req->content($query); $res = $ua->request($req); # split posted variables into pairs @pairs = split(/&/, $query); $count = 0; foreach $pair (@pairs) { ($name, $value) = split(/=/, $pair); $value =~ tr/+/ /; $value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C", hex($1))/eg; $variable{$name} = $value; $count++; } # assign posted variables to local variables $item_name = $variable{'item_name'}; $item_number = $variable{'item_number'}; $payment_status = $variable{'payment_status'}; $payment_amount = $variable{'mc_gross'}; $payment_currency = $variable{'mc_currency'}; $txn_id = $variable{'txn_id'}; $receiver_email = $variable{'receiver_email'}; $payer_email = $variable{'payer_email'}; if ($res->is_error) { # HTTP error } elsif ($res->content eq 'VERIFIED') { # check the $payment_status=Completed # check that $txn_id has not been previously processed # check that $receiver_email is your Primary PayPal email # check that $payment_amount/$payment_currency are correct # process payment } elsif ($res->content eq 'INVALID') { # log for manual investigation } else { # error } print "content-type: text/plain\n\n";
Mid
[ 0.604545454545454, 33.25, 21.75 ]
Keurbooms River The Keurbooms River () is a river in the Western Cape Province in South Africa. The river has its sources south of Uniondale in the Langkloof and flows in a roughly southeastern direction. It passes De Vlugt and the Prince Alfred Pass, flowing along the northern side of the R340 road then it turns south. After crossing the N2 road, it flows into the Indian Ocean through the Keurbooms Estuary, located close to the coastal town of Plettenberg Bay. The Keurbooms River is approximately 85 km long with a catchment area of 1,080 km2. Its main tributary is the Bitou (Bietou). Ecology The Keurbooms River marks the eastern limit of the area inhabited by the Cape galaxias (Galaxias zebratus), a South African fish species endemic to the Cape Floristic Region. It shares the same habitat as imported trouts and lives in an area between the Keurbooms and the Olifants River. Although in South Africa this relatively delicate fish is only classified as near threatened, in Australia species of the same genus were driven to extinction by competing salmonids. See also Keurboomsrivier (settlement) Keurboomstrand List of rivers of South Africa List of estuaries of South Africa Drainage basins of South Africa References External links Keurbooms River Nature Reserve Complex Management Plan Cape Galaxias (Galaxias zebratus) Invasion biology A preliminary assessment of the impact of alien rainbow trout (Oncorhynchus mykiss) on indigenous fishes of the upper Berg River, Western Cape Province, South Africa Category:Rivers of the Western Cape Category:Rivers of South Africa
Mid
[ 0.6150341685649201, 33.75, 21.125 ]
SIMPSON, JAMES, Church of England clergyman and author; b. 11 May 1853 in Maidstone, England, son of James Simpson, a surgeon and dentist, and Marion Campbell; m. 29 June 1891 Alice Maude DesBrisay in Charlottetown, and they had three sons and one daughter; d. there 29 Nov. 1920. After education at Southsea Diocesan Grammar School, James Simpson emigrated to Quebec in 1872, intending to go into business. However, on the advice of two clergymen he studied for holy orders at Bishop’s College, Lennoxville, graduating in arts in 1876 (ma 1879). Having strained his eyes, he did not proceed to ordination but worked for five years as a government surveyor. In 1882 he was engaged as assistant master at Trinity College School, Port Hope, Ont. He was ordered deacon by Bishop Arthur Sweatman* of Toronto in 1882 and priest in 1883. In December 1886 he went to Charlottetown to take temporary charge of St Peter’s Cathedral. Shortly afterwards he was offered the cure of souls there, and he was inducted on 13 Feb. 1887. He remained until his death, styled “priest-incumbent,” for he was neither dean nor rector, the cathedral lacking both chapter and parish. Yet he would be made a canon of his cathedral in 1907 (the first), and in 1915 an honorary canon of All Saints’ Cathedral, Halifax. Under his leadership St Peter’s Cathedral exercised a wide influence in an Anglo-Catholic direction throughout eastern Canada. He introduced Eucharistic vestments in 1889. In the same year All Souls’ Chapel, the work of two brothers, architect William Critchlow and portrait painter Robert Harris, was dedicated; it was used for the daily Eucharist and offices Simpson initiated in 1890. Simpson was a member of the provincial and general synods, a governor of King’s College, Windsor, N.S., and a delegate to the Pan-Anglican Congress held in 1908, and he would serve on the committee which produced the first Canadian revision of the Book of Common Prayer in 1918. In 1914 Bishop’s College made him an honorary doctor of canon law. Most of his published works originated as sermons, and include Prayers for the departed in the light of Holy Scripture; five addresses (Charlottetown, n.d.), Divorce and re-marriage . . . (n.d.), Local temperance . . . (n.d.), Spiritualists examined; five addresses (n.d.), Is confession to a priest in accordance with the teaching of the Church of England? . . . ([ 1891 ?]), The low birthrate, its causes and results ([1898?]), and Only clergy, episcopally and canonically ordained can legally, officiate in the Church of England, in Canada (1920) – all controversial issues on most of which Anglo-Catholics held clear positions that Simpson was firm in upholding. Never one to shrink from controversy, he had accepted the challenge offered by retired judge Alfred William Savary of Annapolis Royal, N.S., when he wrote in the 12 Aug. 1909 issue of Church Work (Halifax) that those who denied that the Church of England in Prince Edward Island was part of the diocese of Nova Scotia were mistaken. In a series of letters Simpson demonstrated, from the letters patent and the actions of the colonial bishops of Nova Scotia, that the Island was an episcopal jurisdiction placed since 1825 under the authority of the bishop of Nova Scotia rather than an integral portion of that diocese. At issue, then and now, is whether or not the church in Prince Edward Island has inherent rights to self-government. Despite his convincing argument, which was endorsed in a church-commissioned report of 1985, Nova Scotia diocesan authorities have been unsympathetic to it, and generally careful not to appoint clergy agreeing with it to leadership positions on the Island. So Simpson was never in his long and distinguished ministry made dean or archdeacon. Simpson’s energies, like those of many English Anglo-Catholic clergy of his generation, were directed to social as well as ecclesiastical matters. Concerned about the effect on family and personal life of the high rate of alcohol consumption in Prince Edward Island, he became active in the temperance movement. After World War I he was chairman of a returned soldiers reception committee and treasurer of a prisoners of war fund which raised $27,000. When he died a former mayor of Charlottetown said, “The poor . . . have lost a dear friend in the Reverend Canon Simpson.” In addition to the publications mentioned in his biography, James Simpson is the author of Christianity and agnosticism: lectures delivered at St. Peter’s Cathedral, Charlottetown, PE.I. (Charlottetown, n.d.). Copies of his pamphlets are available in the archives of St Peter’s Cathedral. We acknowledge the support of the Government of Canada through the Department of Canadian Heritage. Nous reconnaissons l’appui du gouvernement du Canada par l’entremise du ministère du Patrimoine canadien.
High
[ 0.694259012016021, 32.5, 14.3125 ]
Introduction ============ Having excellent knowledge of the referent values of red blood cells (RBCs) variables with children and adolescents is profoundly important for proper interpretation of the results of complete blood count. Reference values for RBCs variables are lower with children in comparison with the adults ([@B1]). Several studies which investigated hematologic parameters have been done in different populations, racial, ethnic and gender subgroups, even in different seasons ([@B2]--[@B5]). In most of these studies, age, ethnic and sex differences were significant and therefore it was stressed the need for establishing normal reference values for different populations. RBC variables are fairly stable through adult life, but significant differences exist in the pediatric population. The newborn infant, older child, and adult show profound differences ([@B6]). Because hemoglobin level and red cell indices vary with age, it is crucial to take as reference standards that change in each period of life, from fetal life to adolescence. Adult value will be reached gradually during the second part of childhood, around 15 yr of age ([@B7]). To ensure that interpretation of hematology results in children are appropriate, the laboratory has to have established age-specific reference ranges ([@B8]). The sex differences in hemoglobin level in adults are well documented, and the underlying mechanisms are probably a direct effect of sex hormones, both estrogen and androgens on erythropoiesis ([@B9]). "In pre-pubertal humans no major differences can be found between the sexes in red blood cell count or hemoglobin and serum ferritin concentrations" ([@B10]). "The difference in hematological variables between sexes emerges after onset of menstruations and persistent until 10 yr after the menopause" ([@B9], [@B10]). Menstruation and nutritional intake are principal reasons for lower values of hemoglobin and iron of women regarding men ([@B11]). The total amount of hemoglobin increases more in boys than in the girls in the period of puberty ([@B12]). Among children 6--14 yr old the values increased from about 12 to about 14 gr per 100 ml of blood. In girls between 14 and 20 yr of age, the hemoglobin values decreased slightly, reaching 13gr/100ml. In boys of corresponding ages, there was an increase to about 15gr/100ml. In both sexes, these values were attained at about 20 yr of age and remained characteristic of the third decade of life ([@B13]). A few comparative studies have been conducted on children in pre-adolescent and adolescent years and the lack of studies and information on hematological parameters for this population is obvious. Assessment of RBC variables in young population and determination of normal values is necessary for identification of anemia. The aim of this paper was to determine the values of RBC variables with young population from both sexes, within age span 8 to 18 years. Possible differences in the group(s) have to be determined regarding the age difference and between the groups regarding the sex. Methods ======= Subjects -------- Study participants consisted of 300 healthy young individuals (age span 8 to 18 yr) which participated continuously in different kinds of sports activities and were involved in regular medical pre-participation check-ups in 2016. A group with male subjects was composed of 240 participants and female group was composed of 80 participants. Both groups were divided into subgroups regarding the two-year interval: under 10 (U10); under 12 (U12); under 14 (U14); under 16 (U16); under 18 (U18). Blood collection ---------------- The hematological testing was part of complete medical checkup for sports pre-participation screening, during morning hours (from 8:00 to 12:00 am) in a controlled laboratory with constant temperature (between 20 °C and 24 °C) and humidity. To determine the blood count blood samples were collected from capillary vessel using sterile plastic containers with anticoagulant (EDTA K3) incorporated in its walls. An experienced evaluator was in charge of the collection procedures. Analysis was determined by automated hematology analyzer ABX Micros 60-OT (ABX hematology, Montpelier, France). The technical error intra rater measurement showed values lower than 1%. Reagents, calibrators, and controls were obtained from the instrument manufacturer. Analysis of samples was performed immediately after blood drawing. The testing was conducted at The Institute of Physiology, Medical Faculty Skopje, Republic of Macedonia. Definitions of analyzed hematological parameters ([@B14], [@B15]) ----------------------------------------------------------------- The erythrocyte or red blood counts also referred to as "RBCs", involve counting the number of RBCs per unit volume of whole blood. Male 4.7 -- 6.1 × 10^6^ cells/mm^3^; female 4.2--5.4 × 10^6^ cells/mm^3^. Hematocrit (Hct) is the percentage of blood that is represented by the red blood cells. Normal ranges for hematocrit are strongly dependent on the age, and well described from newborns to adult age. Optimal values for adult males are between 42% and 54% and for female 38% to 46%.Hemoglobin level (Hb) is expressed as the amount of hemoglobin in grams per deciliter of whole blood. Adult males should have between 14 to 18 g/dl, adult woman 12 to 16 g/dl.Mean corpuscular volume (MCV) is the mean volume of all the red blood cells in the sample or the average size of the red blood cell. It can be calculated by dividing the hematocrit (volume of all RBC) by RBC number. The value is expressed in volume units, femtolitres (fL=10^−15^ L). The normal range is 80-94fL.Mean corpuscular hemoglobin (MCH) represents the mean mass of hemoglobin in the one red blood cell and is expressed in the mass unit, picograms (pg= 10^−12^ gr). It is calculated by dividing the total mass of hemoglobin by the number of red blood cells. The normal range is 27--31 pg.Mean corpuscular hemoglobin concentration (MCHC) is the mean concentration of hemoglobin in the red cell or average concentration of hemoglobin in one liter of red blood cells. It is calculated by dividing the hemoglobin by the hematocrit. MCHC fulfill the meaning of MCH considering the size of the cell. The normal range is 31.5--35 g/dl.RDW or red cell distribution width is parameter that measures variation in red blood size or red blood cell volume. The reference ranges for RDW for adult is 11.6%--14.6%. Ethics ------ Institutional ethical approval was received from the Ethics Committee of the Medical Faculty, Ss Cyril and Methodius University, Skopje, Republic Macedonia (No=03-1197/5). Informed consents were obtained from the parents. Statistical Analysis -------------------- Statistical analysis as performed using the computer software SPSS for Windows version 14.0 (SPSS Inc., Chicago, USA). Analysis of variance factorial analysis and post hoc multiple comparisons were used to evaluate the significance of the differences. Differences in proportions were analyzed using the Chi-square test or Fisher's exact test when appropriate. All data were presented as mean (±SD). Results were considered to be statistically significant when *P*-value was less than 0.05 (*P*\<0.05). Results ======= Hematologic parameters in males ------------------------------- The mean value and standard deviations for general features (age, height and weight) and hematologic parameters (RBCs-red blood cells; Hb-hemoglobin, Hct -- hematocrit; and hematological indices: MCV, MCH, MCHC and RDW) for group of male participants (N=240) are presented in [Table 1](#T1){ref-type="table"}. All parameters are shown for five age different subgroups. High statistically significant difference is found for all general features of participants: age, height, and weight. ###### General characteristics and hematologic parameters of the male participants (8--18 yr, N=240) for age different subgroups ***MALE*** ***U10*** ***U12*** ***U14*** ***U16*** ***U18*** ***P-value*** ----------------- --------------- --------------- -------------- --------------- --------------- --------------- Age(yr) 9.24 (0.32) 11.08 (0.58) 13.28 (0.28) 14.93 (0.54) 16.78 (0.35) 0.001 Height (cm) 131,78 (22.9) 148,69 (22.9) 168,08 (8.6) 177,06 (6.87) 182,29 (6.88) 0.001 Weight (kg) 33,00 (6.9) 41,93 (6.99) 58,65 (12.3) 65,68 (17.02) 76,13 (9.45) 0.001 RBC (10^9/^/dl) 4,79 (0.38) 4,84 (0.39) 5,08 (0.37) 5,27 (0.36) 5,22 (0.35) 0.001 Hb (gr/dl) 12,95 (0.89) 13,31 (0.9) 14,35 (1.15) 14,96 (0.9) 15,25 (0.98) 0.001 HCT (%) 40,48 (2.67) 40,87 (2.69) 44,02 (3.5) 46,25 (2.83) 46,79 (2.81) 0.001 MCV (μm^3^) 84,00 (3.2) 84,45 (3.2) 86,75 (3.4) 87,88 (3.5) 89,7 (2.37) 0.001 MCH (pg) 27,07 (1.36) 27,62 (28.3) 28,28 (1.5) 28,46 (1.89) 29,24 (1.45) 0.001 MCHC (g/dl) 32,21 (0.95) 32,65 (9.5) 32,61 (1.5) 32,39 (1.37) 32,62 (1.37) 0.423 RDW (%) 9,9 (0.56) 9.67 (0.6) 9,76 (0.48) 9,78 (0.45) 9,63 (0.39) 0.174 Values are mean (SD): RBC-red blood cell count, Hct,- packed cell volume, Hb - hemoglobin concentration, MCV- mean corpuscular volume, MCH- mean corpuscular hemoglobin, MCHC - mean corpuscular hemoglobin concentration, RDW- red cell distribution width ANOVA test and multivariate tests (Pillal's trace, Wilks Lambda, Hotelling's trace, and Roy's largest root) showed high statistical level of significance between age different groups (*P*=0.001) for all studied parameters except MCHC (*P*=0.423) and RDW (*P*=0.174). Post hoc multiple comparisons tests for hematologic parameters between age different groups showed that subjects from U10 and U12 groups have similar values between themselves and significantly lower values from all other groups for all parameters except for MCHC and RDW. The similar situation is within U16 and U18 group. They have insignificantly different results between themselves (for RBC, Hb, Hct, MCV, MCH) and significantly higher mean values for these parameters from the younger groups. The subjects from U14 group showed statistically higher means for hematological parameters than U10 and U12 group, but statistically lower means than U16 and U18 group. Values are mean (SD): RBC- red blood cell count, Hct,- packed cell volume, Hb - hemoglobin concentration, MCV- mean corpuscular volume, MCH- mean corpuscular hemoglobin, MCHC - mean corpuscular hemoglobin concentration, RDW- red cell distribution width Hematologic parameters in girls ------------------------------- The mean values and standard deviations for general features and hematologic parameters for group of female participants are presented in [Table 2](#T2){ref-type="table"}. All parameters are shown for five age different subgroups. ANOVA test and multivariate tests showed that there is no significantly difference for all hematological parameters between age different groups (*P*\>0.05). Multiple comparisons test for hematologic parameters between age different groups showed that only subjects from U10 and U18 groups significantly differ for only two parameters, RBC (*P*=0.05) and MCH (*P*=0.28). The youngest group show significantly higher mean RBC than the oldest group. ###### General characteristics and hematologic parameters in female participants (8--18 yr, N=80) for age different subgroups ***Variable*** ***U10*** ***U12*** ***U14*** ***U16*** ***U18*** ***ANOVA, P*** ----------------- -------------- --------------- -------------- -------------- -------------- ---------------- Age(yr) 9.11 (0.42) 10.98 (0.56) 13.12 (0.25) 14.73 (0.51) 16.81 (0.45) 0.001 Height (cm) 133,87 (9.5) 149,34 (10.8) 162,46 (6.3) 164,71 (4.3) 170,25 (7.1) 0.001 Weight (kg) 32,0 (8.29) 44,78 (10.3) 51,85 (7.86) 58,18 (9.3) 62,94 (13.4) 0.001 RBC (10^9/^/dl) 4,99 (0.39) 4,71 (0.22) 4,71 (0.46) 4,68 (0.55) 4,59 (0.26) 0.349 Hb (gr/dl) 12,98 (1.26) 13,33 (1.0) 13,08 (1.38) 12,92 (1.1) 13,49 (1.5) 0.800 Hct (%) 40,61 (3.53) 40,50 (3.2) 40,72 (3.75) 40,6 (3.4) 41,27 (3.33) 0.990 MCV (μm^3^) 81,75 (6.86) 86,25 (34.3) 82,43 (17.5) 87,0 (7.0) 89,75 (3.85) 0.362 MCH (pg) 26,15 (2.74) 27,98 (2.1) 28,25 (3.43) 27,62 (3.16) 29,32 (2.08) 0.253 MCHC (g/dl) 31,94 (0.97) 32,69 (1.3) 30,59 (6.2) 30,18 (6.38) 32,61 (1.12) 0.490 RDW (%) 9,94 (0.58) 9,89 (0.65) 9,82 (0.88) 10,15 (0.78) 10,16 (0.61) 0.712 Comparison of red blood cell parameters by sex ---------------------------------------------- The comparison of the hematologic parameters for total male and female group is presented in [Table 3](#T3){ref-type="table"}. All studied parameters, except MCV and MCH, showed sex-related differences. Analysis of variance factorial analysis applied to the whole male and female groups showed that male participants have significantly higher red blood count (*P*\<0.001), Hemoglobin content (*P*\<0.001) and hematocrit *(P*\<0.001). No differences were found for mean corpuscular volume (MCV) and mean concentration of hemoglobin in one red blood cell (MCH), (*P*=0.292; *P*=0.563). MCHC, mean corpuscular concentration of hemoglobin in 1 L of RBC was significantly higher in boys (*P*=0.002) and RDW, the range of red blood cells width distribution were significantly wider in girls (*P*=0.004). ###### Comparison of hematologic parameters of physically active boys (N=240) and girls (N=80) ***Variable*** ***groups*** ***mean*** ***SD*** ***SE*** ***95% Confidence Interval for Mean*** ----------------- -------------- ------------ ---------- ---------- ---------------------------------------- ------- -------- ------- RBC (10^12^/dl) boys 5.02 0.42 0.274 4.97 5.08 24.450 0.001 girls 4.72 0.41 0.526 4.62 4.83 Hb (gr/dl) boys 14.08 1.29 0.084 13.92 14.25 25.617 0.001 girls 13.15 1.19 0.155 12.84 13.46 Hct (%) boys 43.37 3.85 0.249 42.88 43.86 23.622 0.001 girls 40.69 3.33 0.437 39.82 41.57 MCV (μm^3^) boys 86.27 4.03 0.261 85.75 86.78 1.115 0.292 girls 85.40 9.87 1.274 82.85 87.95 MCH (pg) boys 28.07 1.83 0.118 27.84 28.31 0.335 0.563 girls 27.90 2.84 0.374 27.15 28.65 MCHC (g/dl) boys 32.53 1.23 0.079 32.38 32.69 9.978 0.002 girls 31.51 4.37 0.574 30.36 32.66 RDW (%) boys 9.75 0.49 0.319 9.68 9.81 8.496 0.004 girls 9.98 0.72 0.943 9.79 10.17 Values are mean, SD-standard deviation, SE-standard error. The frequency of hemoglobin concentration is fewer than the lower boundary in nominal values, 12g/dl. With the boys, 4.6% showed subnormal values, i.e. the rest 95.4% used to have normal values. Frequency of suboptimal values of Hb with girls (13.3%) was significantly higher than with the boys (*P*=0.013) ([Table 4](#T4){ref-type="table"}). ###### Frequency of normal and low hemoglobin concentration in boys and girls ***Variable*** ***Hb lower than 12g/dl*** ***Hb normal values*** ***Total*** ***Chi-square test (Pearson)*** ---------------- ---------------------------- ------------------------ ------------- --------------------------------- ------- Male Count % 11 229 240 0.013 4.6% 95.4% 100% Female Count % 8 52 60 13.3% 86.7% 100% Total Count % 19 281 300 6.4% 93.6% 100% Discussion ========== In the Republic of Macedonia, there are no elaborate studies used as local reference ranges for basic RBC parameters and hematological indices for young population. The goal of this study was to help the physicians in comparing the laboratory test results with locally generated RBC variables values. The results of the present study support findings reported by number of authors that the red blood cell variables undergo age different changes in adolescents, and sex-related difference between boys and girls. Dependence of the hematologic parameters of age ----------------------------------------------- Children's reference ranges for routine hematological testing are usually stratified as reference values for newborn at birth, at 2 wk, 4 wk, 2--6 months, 6 months to year, 1 to 6 yr and 6--12 yr, for both sexes. Reference values for children older than 12 yr are different for male and female subjects ([@B16]). Some authors suggest different reference values for hematologic parameters for girls and boys after 13 yr of age ([@B17]). In this paper we decided to divide the examinees from 8 to 18 yr of age, into age different groups from 2-year intervals, groups. The mean values for RBC, Hct, Hb, MCV and MCH in male group showed tendency of increasing with the growth of the age. These parameters in groups U10 and U12 show significantly lower values than other (older) groups, and U16 and U18 show higher values for these parameters from other (younger group). Therefore, the U14 group has significantly higher values for most of the hematologic indices than U10 and U12, and significantly lower values than two older groups U16 and U18. These data indicate that boys older than 12 but younger than 14 year of age, are in the intermediate period regarding the hematological parameters. As far as the hematological indices with the male participants are concerned, the average size of erythrocyte (MCV) grows with the age. Average content, mass of hemoglobin in one erythrocyte (MCH), also grows gradually, with significantly highest values with U18, but with boys younger than 12 (U10 and U12) and boys older than 12 (U14, U16 and U18) there is a significant difference. The average concentration of hemoglobin in one erythrocyte (MCHC) does not show intergroup difference because the size of the cell is taken into consideration. The explanation is simple, with the age of the young examinees, the size of the cell grows and the average content of hemoglobin in it. But their ratio, i.e. concentration of hemoglobin in the cell remains approximately the same. Another parameter, RW, which describes the span of the size of different erythrocytes shown in percentages, does not show mutual difference which leads to equality of the size of erythrocytes in all different groups. The analysis of the hematological parameters with the girls showed that there was not statistically significant difference among the examined hematological parameters. Even though there was a significant difference in age, weight and height, there was not any significant difference found among the hematological parameters, except for the RBC and MCH between the youngest and the oldest group. When age different groups were compared, the only significant difference was found in the number of the erythrocytes (RBC) between the youngest (U10) and the oldest (U18) groups and it was in favor of the younger examinees. The amount of hemoglobin is similar in all groups (it increased insignificantly with the age), but the number of erythrocytes decreases insignificantly with the age and it is much bigger with U10 then with U18. The lack of this examination is that a fairly small number of girls were included, because of the low presence of girls as patients in our laboratory. A similar cross-sectional study of hematologic parameters was conducted in Spain where adolescents with age ranging from 13 to 18.5 yr old. Younger male subjects presented lower RBC, Hb, Hct and MCV mean values than their older counterparts. Same as in our study, these differences were not found in female subjects. As expected and as we found in this study, RBC, Hb, and Hct mean values were found significantly higher in males than in the females ([@B18]). Evaluation of hematologic indices in healthy Ugandan population (aged 1 to 94 yr) showed that erythrocytes, hemoglobin, hematocrit levels and mean corpuscular volume all significantly increased with age (*P*\<0.001) and were independent of age until the age of 13 yr (*P*\<0.001) ([@B19]). The hematologic parameters in youth national soccer teams were investigated and found no difference between U14, U15, and U16 groups, except for the RBC variable ([@B20]). Hemoglobin contents and the RBCs gradually rise to adult levels by the age of puberty ([@B21]). Investigation of hematological parameters in population 1 to 14 yr of age in Bangladesh showed difference between age groups and no difference was found between two sex groups ([@B22]). Dependence of hematologic parameters of sex ------------------------------------------- Men and women have different mean hemoglobin levels in health in venous blood --- women have mean levels approximately 12% lower than men. Since no difference is noticed in the level of erythropoietin with different sexes, the difference in the intensity of erythropoiesis comes from the physiological changes in the kidneys not in bone marrow ([@B9]). There is no evidence showing reduced cellular mechanisms for hem synthesis in women, and there is no difference in the iron absorption between women and men ([@B23]). The established reference ranges for woman are under the influence of large proportion of those with iron deficiency. ([@B11]). The difference in hemoglobin concentration regarding sex has not been found in infants and preschool children ([@B24]), but it has been shown in teenagers and adolescents ([@B25]). In our research, we compare the hematological parameters with male and female examinees, as well as whole groups regardless of their age. The male examinees showed significantly higher values of RBC (5.02 \*10^12^/l vs 4.72 \*10^12^/l; *P*\<0.001); higher values of Hb (14.08 g/dl vs 13.15 g/dl; *P*\<0.001); Hematocrit (43.37% vs 40.69%; *P*\<0.001). The average size of red blood cells (MCV) and medium content of Hb in them (MCH) insignificantly higher with the boys. Due to the similar size of the cells and higher total amount of hemoglobin with the males, MCHC, concentration of Hb in erythrocyte, is higher with the boys (*P*=0.002). The size span of erythrocytes is wider with the girls which lead to bigger variability of the erythrocytes size. For the clinical reference values of RBC, Hb, and Hct no sex differences were observed bellow the age of 12. The values for males were significantly higher than in females in the age range 13--79 ([@B26]). Unusual results are reported regarding the hematologic indices in male and female children younger than 12 yr. Mean Hb, Hct, MCV, and MCH of school-aged boys were significantly lower than girls ([@B27]). In the survey on haemoglobin level in the different age groups in man and woman in Indian population in the group aged 12 to 19 yr, males showed Hb mean concentration of 11.76 g/dl and female showed higher mean value, 12.31 g/dl ([@B28]). The research on hematological indices in in Kuwaiti children aged 7--12 yr, were RBC=4.78±0.42; Hb=127.3±9.4 /dl for boys and RBC=4.7±0.4; Hb=126.9±9.8 /dl for girls. Same parameters for older children, 13--17 yr, were RBC=5.18±0.48; Hb=145±14.4 /dl for boys and RBC=4.68±0.43; Hb=129.6±9.8 /dl for girls ([@B29]). As we can see these results are concordant with ours, regarding the sex differences (in favor of boys), and regarding the existing substantial age difference in male group and no age difference in female group. Normal hemoglobin levels according to WHO for children aged 5--12 yr above 11.5 gr/dl and teenagers aged 12--15 yr equal or above 12g/dl. Above 15 yr the adolescent are referred to as adults, and normal Hb level for adult male is 13.8--17.2 g/dl, and for adult female 12.1--15.1 g/dl ([@B30]). The primary aim of analyzing red blood cells variables is to discover and diagnose type of anemia in case it is present. Anemia was defined as hemoglobin concentration \<11g/dL for children aged between 6 and 59 months, while 11.5 g/dl for children aged 5 and 11 yr and \< 12 g/dl for children older than 12 yr according to WHO ([@B30]). As a lower boundary of nominal values for hemoglobin concentration in our laboratory is considered the value of 12 g/dl. In our laboratory that value is the same for both children and adults. Only 4.6% of our male examiners had low values of hemoglobin, and much more in the female group 13.3%. Conclusion ========== The young male examinees there exists a significant difference among different age groups, with special emphasis that hematological variables in boys aged 12 to 14 yr have the intermediate values between those with pre-puberty (\<12 yr) towards those adolescent boys (\>14 yr). RBC variables with girls from different age subgroups did not show significant differences. Significant difference is found only in red blood cell counts between the oldest (U18 group) and youngest (U12 group) in favor of the younger girls. RBC variables, regardless of the age, differ very much between male and female examiners, in favor of the male examinees. Hematological indices were insignificantly higher in males. Ethical considerations ====================== Ethical issues (Including plagiarism, informed consent, misconduct, data fabrication and/or falsification, double publication and/or submission, redundancy, etc.) have been completely observed by the authors. The researchers want to thank the Institute of Physiology, Medical Faculty, UKIM, Skopje, and all the people who had been involved in this study. **Conflict of interest** The authors declare that there is no conflict of interests.
High
[ 0.682385575589459, 30.75, 14.3125 ]
Q: How to increase the disk space of an Ubuntu VMWare guest, without the cd? I powered off the VM and on the VMware side increased the allocated disk space. I did this by Edit Virtual Machine Settings -> Hard Disk -> Utilities and so forth. It then warned me that I should increase the partition size within the guest VM. and i dont know how to make the machine know it and i dont know where my CD is.. A: You don't need an actual CD. Just get the .iso image from http://www.ubuntu.com/download. Mount the .iso in the virtual machine. Start the virtual machine and make sure to boot from the CD. Select "Try Ubuntu". Open the Unity dash and launch "GParted". It can be used to resize the partition. A: Use VM Workstation to expand the VMs disk: Settings > Hard Disk > Utilities > Expand (Disk Capacity) Start VM On linux sudo df -h sudo fdisk -l From the above you should see the Disk size has increased to the value you chose in VM Workstation, but the linux VM does not know how to use it yet. Download GParted (linux gui disk utility) download the iso (for me gparted-live-0.19.1-4-amd64.iso) burn a bootable disk from this iso Make sure your VM connects to the CD/DVD you are going to place the bootable dvd back into your drive bay, but you need the VM to connect to it. In Workstation right click on a running VM and you will see removeable devices. Unfortunately, the VM needs to be running before you can see the removeable devices option. your-vm > removeable devices > CD/DVD > connect now your vm connects to the dvd, but you still have to boot from it. Use VM Workstation to boot to bios Select your VM (NOT running) > Power On > Power On to Bios When bios menu comes up go over to Boot option Select the CD/DVD drive and hit (+) to move it up, but (+) doesn’t work!! Use the (-) on the other options to move them down below CD/DVD F10 save/quit Now you are booting from GParted I picked defaults, but still had to pick a keyboard, US English We are now at the GUI for GParted You should see your current drive on the left, followed by Extended>Swap, followed by the expanded-unallocated disk space you added Using GParted Expand the Extended>Swap First Select which ever partition is adjacent to the unallocated portion. In my case this was the Extended>Swap Partition. NOTE: Make sure you selected the Extended, NOT the Swap! Swap is inside the Extended. Hit Move/Resize You should see the Extended partition with unallocated space to the right. Expand the partition to consume all / most of the unallocated space. Apply the change ( you probably can do multiple operations at once, i did not) after a bit gparted shows the changed Move the Swap to the far right of Extended Partition You can see where this is going... Select the swap, move to the right, now unallocated is on the left of it. again I applied this now select Extended and shrink it now unallocated is between the partition you want to increase and extended Increase your Partition Unfortunately, its like one of those puzzles you have to slide all the parts until you get to the one you want. Shutdown GParted Select you VM > Power> Power On to Bios, move CD/DVD down below HD Now your VM is up and running with more space Eject GParted DVD and/or Removeable Devices> Disconnect CD/DVD You should be good to go!
High
[ 0.6918767507002801, 30.875, 13.75 ]
Q: How do I get cywgin's remove file command to prompt a warning when I try to delete a file? Whenever I use rm to remove files in my Cygwin terminal, the file gets deleted without any warning. This is particularly annoying when I try to remove multiple files with the wildcard and some other characters. A: Since Cygwin is Linux shell running inside the Windows OS, you can try something similar to what you would do in actual Linux. Open your .bashrc file in the Vim editor: vi ~/.bashrc Add the following line at the end of the file alias rm=’rm –I’ This tells Cygwin to run the command rm as rm -I, which is remove in information mode. This will generate the warning prompt each time you try to rm a file. You might also want to change the settings for the root user, and possibly other users. Have a look at this useful article for more information.
High
[ 0.6725925925925921, 28.375, 13.8125 ]